Policies
General
Published on
User Access Provisioning and Deprovisioning Procedure Free Template
Here is a fully developed User Access Provisioning and Deprovisioning Procedure, aligned with SOC 2 Trust Criteria (CC6.1, CC6.2) and ISO/IEC 27001:2022 (Controls A.5.15–A.5.18):

1. Document Control
Document Title: User Access Provisioning and Deprovisioning Procedure
Document Identifier:
PRC-IT-001Version Number:
v1.0Approval Date:
<23 June 2025>Effective Date:
<23 June 2025>Review Date:
<23 June 2026>Document Owner:
<IT Operations Manager>Approved By:
<Chief Information Security Officer>
2. Purpose
The purpose of this procedure is to define the steps for granting, modifying, and revoking user access to ’s information systems, data, and applications. Consistent implementation of this procedure supports role-based access control (RBAC), least privilege principles, and lifecycle management of user identities.
This document is designed to satisfy SOC 2 Trust Services Criteria CC6.1 and CC6.2, which require control over logical access to systems and data, as well as ISO/IEC 27001:2022 Controls A.5.15 (Access control policy), A.5.16 (User access management), A.5.17 (User registration and deregistration), and A.5.18 (Privilege management).
3. Scope
This procedure applies to:
All employees, contractors, interns, and third parties with access to ’s systems
All systems, applications, and services that require authentication or authorization
All access types including standard user, privileged, service, and API accounts
This procedure governs both new access provisioning and access removal during offboarding or internal role changes.
4. Procedure Overview
4.1 Access Provisioning
Access Request Initiation
Manager or hiring supervisor submits an access request through the IT ticketing system or HRIS integration.
Request must include: name, role, department, required systems, justification, and start date.
Approval Workflow
Requests must be approved by both the hiring manager and the system/data owner.
Elevated access (admin/root) requires additional approval from IT Security.
Account Creation and Role Assignment
IT or IAM administrator creates the account using standard naming conventions.
Role-based access templates are used for consistency.
MFA is enforced for all accounts accessing sensitive or production systems.
Documentation
All access requests and approvals are documented and retained for a minimum of 2 years.
4.2 Access Modification
Role or Department Changes
HR or manager notifies IT of any changes impacting access needs.
A new access request is submitted with updated requirements.
Old permissions are reviewed and revoked as needed before new ones are granted.
Periodic Access Review
Quarterly access reviews are performed by system owners.
Any discrepancies are remediated and documented in the audit log.
4.3 Access Deprovisioning
Termination Notification
HR triggers the offboarding workflow upon resignation, termination, or contract end.
Immediate terminations are flagged as urgent for same-day processing.
Account Deactivation
IT disables user accounts within 24 hours of termination notice.
Shared credentials and service accounts are rotated if applicable.
Device access, VPN, email, and SaaS tools are all covered in the deprovisioning checklist.
Data Retention/Transfer
User-owned data is reassigned to the manager or designated backup.
Data stored in personal drives or inboxes is archived or deleted per data retention policy.
5. Roles and Responsibilities
Role | Responsibilities |
|---|---|
IT Operations Team | Implements provisioning/deprovisioning tasks, manages access control systems |
Managers | Initiate access requests, validate access needs, and ensure revocation during role change or exit |
HR Department | Triggers onboarding/offboarding processes and shares personnel status changes |
Data/System Owners | Approve access to systems they manage, participate in quarterly access reviews |
CISO | Oversees compliance with access control policy and ensures alignment with security standards |
6. Safeguards and Controls
Control ID | Control Description |
|---|---|
ACC-01 | Mandatory MFA for all administrative and remote access accounts |
ACC-02 | Unique IDs assigned to all users — shared credentials prohibited |
ACC-03 | Quarterly user access reviews logged and retained for 24 months |
ACC-04 | Immediate access revocation within 24 hours of termination |
ACC-05 | Use of role-based access templates with system owner validation |
ACC-06 | Logging and alerting for privileged account usage and provisioning errors |
7. Compliance and Exceptions
All provisioning and deprovisioning actions are subject to internal audit. Exceptions to this procedure must be approved by the CISO, documented with a risk assessment and compensating controls, and reviewed biannually.
8. Related Policies/Documents
POL-ALL-003: Access Control Policy
POL-HR-001: Employee Onboarding and Offboarding Policy
POL-ALL-015: Confidentiality Policy
POL-HR-002: Security Awareness and Training Policy
SOC 2 Trust Criteria: CC6.1, CC6.2
ISO/IEC 27001:2022 Controls: A.5.15–A.5.18
9. Review and Maintenance
This procedure shall be reviewed annually by the IT Operations Manager and CISO or upon implementation of a new identity and access management (IAM) solution. All procedural changes must be version-controlled, approved, and communicated to stakeholders.
