You are on page 1of 3

Quezon City University

Process: IT Access Management


Activity 3

# Process/ Subprocess Risk

Users are granted access


rights on the basis of an
approved request. and
limited only to access
required to carryout their job
responsibilities.

Unique user ID is assigned


to each user. No group IDs
exist and shared by multiple
users.

A.New hires & transfers

Changes to users’ access


should be approved and
their role re-evaluated to
prevent “role creep” which is
caused by incremental
additions to access
overtime, causing
segregation of duties risks.

Access rights should be


promptly disabled and/or
removed once users leave
the company.

B.Terminations and
resignations
If there is no or ineffective
periodic review, extended
testing of terminations and
resignations is performed
Existing controls Frequency Objectives

Data Ownership on the to prevent unauthorized


classification of data access to data and
elements and the allocation unauthorized use of system
of responsibility for ensuring functions and program
confidentiality. Assigning
responsibility for protecting
data to a particular
employee, accountability is
established

Privacy impact analysis is to establish a right to trust


an instrument for assessing that others will appropriately
the potential impacts on and legitimately use, store,
privacy of a process, share, and dispose of the
information system, associated personal and
program, software module, sensitive information within
device or other initiative the context, and according
which processes personal to the purpose for which the
information and in data have been stored and
consultation with derived
stakeholders, for taking
actions as necessary to
treat privacy risk.

data are identified and


authorized in writing

Written termination policies provide adequate protection


are established and provide for the organization's assets
clear steps for employment and data
separation. Addressing
voluntary and involuntary
separation
Audit Procedures
Audit Procedures
(Test of Operating
(Test of Design)
Effectiveness)
use the information review a sample of the job
regarding data ownership to description to ensure that
determine if proper responsibilities and duties
ownership has been are consistent with the
assigned and whether the security policy.
data owner is aware of the
assignement.

Review management's check whether personnel


Privacy Policy to ascertain sensitive are correctly
whether it takes into managed and verify if the
consideration the correct security measures
requirement of privacy laws are adopted.
and regulations.

organization have a clear asses if the necesssary item


definition and have been refunded such
documentation procedure as devices, item keys, ID
for teminating employee to cards and Badges to
the compay prevent easy physical
access

You might also like