Sacramento State Level 1 Systems Access Review Template
Sacramento State Level 1 Systems Access Review Template
Sacramento State Level 1 Systems Access Review Template
1.0 Background
ICSUAM Information Security Policy on Access Control requires an access review be conducted at least annually for
information assets (systems/applications) containing protected data. The results of the review must be documented.
The following procedure is intended to comply with this CSU Access Control Policy.
2.0 Scope
All systems that contain protected university information assets classified as level 1/confidential/Personally Identifiable
Information (PII). This includes all campus and auxiliaries cloud services, workstations, applications, servers, databases,
etc., Sacramento State’s Common Management Systems and OnBase imaging and workflow follow a separate process.
Administrative access includes any access assigned to users that are in addition to any self-service type of access. The
responsible administrator conducting the review must not have Account Administrator permissions. See below for the
types of roles and responsibility that may be assigned for users with administrative access.
Role Responsibility
Account Holder The individual or group which is assigned the Account. This could be a privileged or general
account.
Privileged Account An account that may have administration access to configure setup, security administration,
interface configurations, development(coding), daily batch jobs, data extract, etc.,
Security Those who support Accounts by adding, modifying, assigning passwords, or other account
Administrator management actions.
System/Service Those who are members of organizational units that support enterprise, division, or
Administrators department level IT services. System/Service administrators within their area of
responsibility facilitate end-user privilege management and implement operating procedures
to conform to campus information security standards and guidelines.
System/Service The system owner is ultimately responsible for providing the system’s service/functionality
Owner to the campus. Often the system owner is a manager/director, department chair, or dean.
Data Owner The data owner is responsible for establishing procedures for granting and revoking access
privileges. https://www.csus.edu/information-resources-technology/it-governance/data-
security-governance.html
1
Sacramento State User Access Review Procedure for Level 1 Systems
3.0 Procedure
The steps below outline the procedure/process to coordinate the review from initial reports generation to the final step
of certifying the overall process.
3.1 Create list of Create a list of roles and/or templates that are used to control access to the system/service.
roles/template Example: administrative roles, user roles, privileged access roles.
Role: a standard template created and assigned to user(s) based on operational need
3.2 Create access Generate a report of active users and the roles assigned for each user. Note: standard user
report accounts that have access to their own data do not need to be included in the report.
3.3 Audit access Conduct a comprehensive review of the list of users and roles at a minimum:
report
1) Is this an active employee?
5) Is this a shared account (i.e. does more than one person know the password)?
3.4 Mark action Mark any users and/or privileged roles/templates that may need to be removed or changed in
needed the access report. Example: create an additional column for notes in the access report.
3.5 Certification Document the access review activity using the template provided in Adobe Sign. Route it for
review/signature to the Data Owner. It is the responsibility of the responsible administrator
(MPP) to certify the access review.
Include an appendix for additional descriptions and/or information that may not fit in the
template
3.6 Submit Submit the completed review to the Information Security Office
The Information Security Office will use the application inventory database to identify all level 1 systems and
assigned System Owners to coordinate the review, annually at a minimum.
In accordance with System wide Information Security Policy on Access Control 8060.0 and Sacramento State Level 1
Systems Access Review procedures, I/we have conducted a review of the level 1 systems that are under my purview.
Division Name
System Owner
Department Name
Certification Date
Service Description
Review/Approval History