Skip to main content

The GDS Way and its content is intended for internal use by the GDS and CO CDIO communities.

Tracking Access Control

You should track the list of users who have access to secrets by logging the permissions, such as accounts and credentials, associated with a security resource in a single, centralised Access Control List (ACL). The ACL specifies who or what is allowed to access the resource containing secrets and the operations which are allowed to be performed on the resource. Also see Principle of Least Privilege for authentication and authorisation guidance.

ACL repositories used to log access to systems for storing and processing secrets should have designated colleagues within each directorate responsible for reviewing access granted on a defined periodic cadence (e.g. monthly, quarterly).

Identified exceptions should be raised with the colleague responsible for risk management in the directorate for escalation.

Teams ACL review should be documented to reflect: * who (colleague) completed the review * date review is undertaken * next review date * any changes to user status granted access, and the reason for change (if any). * refer to new joiner, mover and leaver access process to reflect change in access status

Further guidance

This page was last reviewed on 26 October 2022. It needs to be reviewed again on 26 April 2023 by the page owner #gds-way .
This page was set to be reviewed before 26 April 2023 by the page owner #gds-way. This might mean the content is out of date.