Appropriate Measures to Control Access to Computer Resources

Controlling access to computer resources is critical to preventing unauthorized access to personal data. The following measures should be implemented:

1. Role-Based Access Control (RBAC)

  • Assign system access permissions strictly based on job roles and responsibilities.
  • Define roles such as Admin, User, Auditor, etc., with clear access privileges.
  • Implement least privilege principle – users only access what they need.

 

  1. Multi-Factor Authentication (MFA)
  • Enforce MFA for all access to internal systems, cloud services, and sensitive data environments.
  • Combine passwords/PINs with a secondary factor (e.g., OTP, biometric, hardware token).

 

  1. Identity and Access Management (IAM)
  • Use an IAM solution to manage digital identities, authentication, and authorization.
  • Conduct periodic access reviews to ensure terminated or transferred users no longer have access.
  • Automate provisioning and de-provisioning of user access.

 

  1. Strong Password Policies
  • Enforce minimum password length, complexity, and rotation policies.
  • Prohibit reuse of previous passwords and block common passwords using filters.

 

  1. Endpoint Security Controls
  • Require company-managed devices with security tools installed (antivirus, disk encryption).
  • Block access from unauthorized or jailbroken devices.

 

  1. Secure Remote Access
  • Provide remote access via Virtual Private Network (VPN) with encrypted channels.
  • Implement Network Access Control (NAC) to enforce posture checks before granting access.

 

  1. Access Logging and Monitoring
  • Maintain detailed logs of access to systems, applications, and databases.
  • Enable alerts for unusual access patterns, multiple failed login attempts, or privilege escalations.

 

  1. Time-Bound and Just-In-Time (JIT) Access
  • For highly sensitive data, grant temporary access for a specific task or time window.
  • Use Just-In-Time (JIT) provisioning tools to automatically revoke access after use.

 

  1. Segregation of Duties (SoD)
  • Ensure critical functions (e.g., access control configuration and access review) are separated among different personnel to avoid abuse.

 

  1. Access to Data Processors
  • Monitor and control third-party/vendor access to systems.
  • Provide access only via secure, monitored channels, and ensure contractual controls are in place.
  • Ensure Data Processing Agreements (DPA) define clear access responsibilities.

 

  1. Regular Audits and Penetration Testing
  • Perform internal and external audits on access controls.
  • Conduct penetration testing to evaluate how securely resources are protected from unauthorized access.

Disclaimer: The information contained in this Article is intended solely for personal non-commercial use of the user who accepts full responsibility of its use. The information in the article is general in nature and should not be considered to be legal, tax, accounting, consulting or any other professional advice. We make no representation or warranty of any kind, express or implied regarding the accuracy, adequacy, reliability or completeness of any information on our page/article. 

To stay updated Subscribe to our newsletter today

Explore other Legal updates on the 1-Comply and follow us on LinkedIn to stay updated 

Post Views: 76

Schedule A Demo