Cyber Essentials6 min read

User Access Control: Right People, Right Access

User access control ensures that only authorised individuals can access your systems and data—and that their access is limited to what they actually need. This control helps prevent both external attackers and insider threats from reaching sensitive resources.

Key Takeaways

Point Summary
Unique accounts Each user must have their own account—no shared accounts
Least privilege Users should have the minimum access needed for their role
Admin restrictions Admin accounts only for admin tasks; no email or browsing with admin accounts
MFA recommended Multi-factor authentication for cloud services and admin accounts
Remove leavers promptly Disable accounts when staff leave or change roles

Quick Answer: Cyber Essentials requires unique user accounts with least-privilege access. Admin accounts should only be used for admin tasks. MFA is strongly recommended for cloud services. Remove access promptly when employees leave.

Why access control matters

Poor access control is a common factor in breaches. When everyone has admin rights, a single compromised account can give attackers access to everything.

Without proper access control:

  • All users have admin rights
  • Shared accounts hide accountability
  • Ex-employees may still have access
  • Malware runs with full privileges
  • One breach can mean total compromise

With proper access control:

  • Users have only the access they need
  • Individual accounts provide accountability
  • Leavers are removed promptly
  • Malware is limited to user-level access
  • Breaches are contained to affected accounts

What Cyber Essentials requires

Core requirements

Requirement Details
User authentication All accounts must authenticate before access
Unique accounts Each user has their own account
Appropriate privileges Users only have access they need
Admin account control Minimise and control admin accounts
Account lifecycle Process for creating and removing accounts

Authentication requirements

Aspect Requirement
Password minimum 8 characters (12+ recommended)
Or passphrase Minimum 12 characters
Or MFA Multi-factor instead of longer password
Account lockout Enable after failed attempts
Biometrics Acceptable with device-stored template

Implementing access control

Step 1: Establish account policy

Define your account management approach:

Account types:

  • Standard user accounts: For day-to-day work, no admin privileges, used for email, browsing, and applications

  • Administrative accounts: For system administration only, not for email or browsing, named individuals (not generic), higher authentication requirements

  • Service accounts: For application or service use, strong unique passwords, minimum required privileges, regular review and rotation

Account lifecycle:

  • Creation: Approved, documented, minimum access
  • Modification: Approved changes only
  • Review: Regular access reviews
  • Removal: Prompt deactivation on departure

Step 2: Apply least privilege

Users should have the minimum access needed for their role:

Role Typical Access Level
Standard employee Standard user, job-specific applications
IT support Standard user + specific admin tools
System administrator Admin account (separate from daily use)
Finance Standard user + finance applications
HR Standard user + HR systems

Step 3: Separate admin and standard accounts

People who need admin access should have two accounts:

Standard account (e.g., john.smith):

  • Used for email, browsing, documents
  • Standard user access level
  • Password meeting company policy
  • Daily use account

Admin account (e.g., john.smith.admin):

  • Used for admin tasks only
  • Administrative access level
  • Stronger password + MFA recommended
  • Not for daily use—admin tasks only

Why separate accounts?

  • Limits exposure of admin credentials
  • Malware from browsing or email runs as standard user
  • Phishing is less likely to compromise admin credentials
  • Audit trail distinguishes admin actions
  • Forces conscious decision to elevate privileges

Step 4: Configure authentication

Set appropriate authentication requirements:

Setting Cyber Essentials Minimum Recommended
Password length 8 characters 12+ characters
Complexity Or passphrase Passphrase recommended
MFA Reduces length requirement Enable for all admin accounts
Lockout Enable 5-10 failed attempts
History Not specified Prevent password reuse

Step 5: Manage account lifecycle

Establish processes for account changes:

New starter (joiner):

  • HR notifies IT of new employee
  • Manager requests appropriate access level
  • Account created with minimum necessary access
  • User receives credentials securely
  • Access granted is documented

Role change (mover):

  • Manager requests access change
  • Review current and new requirements
  • Add access needed for new role
  • Remove access no longer needed
  • Changes documented

Departure (leaver):

  • HR notifies IT promptly
  • Account disabled immediately
  • Review for any shared credentials
  • Archive if needed for compliance
  • Delete after retention period
  • Removal documented

Admin account best practices

Minimising admin accounts

Principle Implementation
Minimum number Only those who genuinely need admin access
Named accounts No generic 'Administrator' or 'Admin' accounts
Documented List of who has admin access and why
Regular review Quarterly review of admin access
Justified Business reason for each admin account

Protecting admin accounts

Protection Implementation
Strong authentication MFA strongly recommended
Separate credentials Different password than standard account
Limited use Not used for email or browsing
Monitoring Log and review admin activities
Privileged workstations Consider for high-security environments

Access control audit

Regular reviews

Review Suggested Frequency Action
User access appropriateness Quarterly Verify access matches role
Admin account inventory Quarterly Validate each admin account
Inactive accounts Monthly Disable unused accounts
Leaver account removal Daily/weekly Verify prompt removal
Service account review Bi-annually Validate necessity

Pre-certification checklist

  • All users have unique accounts
  • No shared accounts in use
  • Password policy meets requirements
  • Admin accounts separated from daily use
  • Admin accounts minimised and justified
  • Joiner/mover/leaver process documented
  • Account lockout enabled
  • Access reviews conducted
  • Ex-employees removed promptly

Common access control issues

Frequently found problems

Issue Risk Solution
Shared accounts No accountability Individual accounts
Everyone is admin Malware has full access Apply least privilege
Generic admin accounts No audit trail Named admin accounts
Old accounts still active Potential misuse Regular access reviews
No leaver process Ex-employee access HR/IT process
Weak passwords Account compromise Strong policy + MFA
Admin used for daily work Unnecessary exposure Separate accounts

Handling exceptions

Sometimes access exceptions are genuinely needed:

Request:

  • Business justification required
  • Duration specified
  • Risk assessed
  • Approval documented

Review:

  • Is exception truly necessary?
  • Are there alternatives?
  • What compensating controls?
  • What's the risk level?

Approval:

  • Document approver
  • Set expiry date
  • Implement compensating controls
  • Schedule review

Monitor:

  • Track exception validity
  • Review before expiry
  • Remove when no longer needed
  • Audit exception usage

How Bastion can help

Managing access control effectively requires good processes and consistent execution.

Challenge How We Help
Policy development We create access control policies tailored to your organisation
Process implementation We help establish joiner/mover/leaver workflows
Access reviews We help automate and track access reviews
Admin account management We provide guidance on privileged access
Compliance monitoring We help maintain visibility into access control

Working with a managed service partner means access control becomes a structured, consistent process rather than something that depends on individual memory or ad-hoc requests. We help ensure nothing falls through the cracks.


Need help implementing access controls? Talk to our team