Why a User Access Control Policy is crucial for your organisation

Do you know who I am? Why a User Access Control Policy is crucial for your organisation

Organisations spend a lot of time and effort protecting their networks from external attacks. However, it is insider threats that are viewed as one of the biggest risks to corporate data according to IT decision makers surveyed in the Cyber-Ark 2012 Trust, Security & Passwords report.

To efficiently mitigate insider threats and reduce the attack surface of an Information System, a network must be set on a 'need-to-know' and 'need-to-use' basis.

In real terms, this means that IT departments must ensure that each user in their organisation can only log in according to the pre-authorisation that has been granted. Unfortunately, this is usually not the case.

Uncontrolled User Access - The stadium metaphor

Imagine a football stadium. Once in possession of a ticket, you are able to enter the stadium at any time, through any entrance, watch every game and stay as long as you wish.

That is exactly what a Windows network looks like without an appropriate and enforced User Access Control Policy. Users are able to login at any time, from any system or device and from several systems simultaneously, stay logged in for as long as they want and share their credentials with their colleagues or even outsiders without any danger of consequences with regard to their own access.

Access restrictions – The need to go granular

Logins are the first line of defense for a Windows network. Login rights must therefore be granted parsimoniously based on business and security requirements and on the role of the user within the organisation.

This involves setting login restrictions according to various criteria. Such restrictions must take into consideration the session type (workstation, terminal, Internet Information Services, Wi-Fi/Radius or VPN/RAS) and its application (performed on a 'per user', 'per user group' or Active Directory Organisational Unit basis) to create a comprehensive matrix of access rules.

  1. Different login limitations should be set to ensure that every user in the organisation has sufficient access rights to fully perform his tasks without restriction, but no more.
  2. Concurrent logins (same ID, same password) should be banned or strictly limited to specific situations. Allowing simultaneous sessions means that several workstations can be blocked by one user, thus impeding resource sharing, and can easily result in corrupt roaming profiles and the creation of versioning conflicts for offline files.
  3. Logins from multiple systems should also be limited and users should be restricted to only connect to the network from their own workstation or from a predetermined set of workstations (e.g. those in their department, their floor, their building, etc.).
  4. Time is another critical factor in Information Security. The average user should be able to login only during business hours, with exceptions handled and controlled with care.

Making legitimate users accountable for illegitimate actions

No set of security measures is 100% perfect and an incident can always happen. In this case, collection and analysis of data relating to the session activity history of a Windows network must be performed.

This requires that all access events be recorded and that a comprehensive and detailed connection list (logon, lock, unlock, logoff instances, users, domains, workstations etc.) is always available to facilitate efficient forensic IT investigations.

Organisations that have ensured that access to critical assets is attributed to individual employees are then able to enforce policies and procedures consistently to address violations that do occur.

  • François Amigorena is founder and CEO at IS Decisions a software vendor specializing in Security & Access Management for Microsoft Windows-based infrastructures.
François Amigorena

François Amigorena is CEO of IS Decisions who develop the logon security solution UserLock. He is an expert in solutions for user access control, file auditing, server and desktop reporting, and remote installations, IS Decisions combines the powerful security today’s business world mandates with the innovative simplicity the modern user expects.

Read more
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Don’t let holidays be your cybersecurity downfall
Cyber-security
The definitive guide to credential collaboration
Hands typing on a keyboard surrounded by security icons
Infostealers on the rise: the latest concern for organizational defenses
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Security padlock in circuit board, digital encryption concept
A guide to integrating application security into any cyber defense strategy
Latest in Security
A graphic showing someone on a tablet working through a supply chain.
Security issue in open source software leaves businesses concerned for systems
ransomware avast
One of the most powerful ransomware hacks around has been cracked using some serious GPU power
person at a computer
Infamous ransomware hackers reveal new tool to brute-force VPNs
person at a computer
Many workers are overconfident at spotting phishing attacks
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
Data Breach
Thousands of healthcare records exposed online, including private patient information
Latest in News
Pebble smartwatch countdown
Pebble confirms its smartwatch announcement is just hours away
Google DeepMind panel discussion
“More sovereignty and protection” - Google goes all-in on UK AI with data residency, upskilling projects, and startup investments
Nintendo Switch 2
Nintendo Switch 2 expected to have AI upscaling and I can't wait to finally play Tears of the Kingdom with upgraded graphics
PowerColor Red Devil AMD RX 9070 XT graphics card shown side-on
Your next GPU could be from AMD, not Nvidia, if Team Red’s success with PC gamers continues
Intel Lunar Lake concept
Intel's Panther Lake processors won't arrive until Q1 2026 - corroborates previous delay rumors despite former Intel CEO's promise of 2025 launch
Quordle on a smartphone held in a hand
Quordle hints and answers for Tuesday, March 18 (game #1149)