Medryte Healthcare Solutions Pvt.
,Ltd Normal
Access Management Process & Approval Matrix
Document
Responsibility: Selva Kumar 24-13708
No:
Department: IT & Networking Revision: 1.1
Date: 05-Aug-2024 Sheet: 1 of 4
Introduction
1. Purpose
This document outlines the access management process and approval
matrix for Medryte to ensure that access to company resources is
controlled, monitored, and aligned with security best practices.
2. Scope
This policy applies to all employees, contractors, and third parties
requiring access to Medryte’s systems, applications, and data.
3. Access Management Process
A. User Access Request
Users must submit an Access Request Form through the Medryte IT
Service Desk or an authorized access request portal.
The request must specify the system, data, or application needed,
along with a valid business justification.
B. Approval Workflow
Access requests must be approved as per the Access Approval Matrix
(see below).
Approvals must be documented and logged for audit purposes.
C. User Authentication & Authorization
All users must have unique login credentials with strong password
policies.
Role-Based Access Control (RBAC) must be enforced, ensuring users
only have the minimum necessary access.
D. Access Review & Revocation
Access rights must be reviewed quarterly by department heads and IT
Security.
Accounts must be disabled or removed immediately upon employee
exit or role change.
Privileged access accounts must be subject to stricter monitoring and
periodic re-approval.
E. Emergency Access & Exception Handling
Temporary access for emergency situations requires approval from
senior management and IT Security.
Emergency access logs must be reviewed post-event.
4. Access Approval Matrix
Requested Final
Access Type Approved By
By Authorization
General System Access Employee Department Head IT Security
Administrative Access IT Staff IT Manager Director
HR System Access HR Employee HR Manager Director
Vendor Department Head &
External Vendor Access Director
Sponsor IT Sec
Emergency Privileged
IT Admin Director & IT Security MD
Access
5. Compliance & Monitoring
All access requests and approvals must be logged and auditable.
Periodic access audits will be conducted to ensure compliance with
Medryte security policies.
Violations of this policy may result in disciplinary action, including
revocation of access privileges.
6. Review & Updates This document will be reviewed annually to align with
Medryte’s evolving security requirements.
Document Version History
This table shows a record of significant changes to the document.
Versio Date Author Description of Change
n
05-Aug-
1.0 Selva Kumar Initial release
2023
02-Aug-
1.1 Selva Kumar Version Update
2024
APPROVALS
This table shows the approvals on this document for circulation, use, and
withdrawal.
Versio Date Approver Title/ Approval Remarks
n Authority
1.0 07-Aug- Mr.Sujin Jekash Simson MD Verified
2023
1.1 05-Augr- Mr.Sujin Jekash Simson MD Verified
2024
Approval & Acknowledgment I acknowledge that I have read and
understood the Medryte Access Management Process and Approval Matrix
and agree to comply with its guidelines.
Employee Signature: __________________________
Date: ___________________________