Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
26 views4 pages

Access Management Process

Uploaded by

medryte23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views4 pages

Access Management Process

Uploaded by

medryte23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Medryte Healthcare Solutions Pvt.

,Ltd Normal

Access Management Process & Approval Matrix

Document
Responsibility: Selva Kumar 24-13708
No:

Department: IT & Networking Revision: 1.1

Date: 05-Aug-2024 Sheet: 1 of 4

Introduction
1. Purpose

This document outlines the access management process and approval


matrix for Medryte to ensure that access to company resources is
controlled, monitored, and aligned with security best practices.

2. Scope

This policy applies to all employees, contractors, and third parties


requiring access to Medryte’s systems, applications, and data.

3. Access Management Process

A. User Access Request

 Users must submit an Access Request Form through the Medryte IT


Service Desk or an authorized access request portal.

 The request must specify the system, data, or application needed,


along with a valid business justification.

B. Approval Workflow

 Access requests must be approved as per the Access Approval Matrix


(see below).

 Approvals must be documented and logged for audit purposes.


C. User Authentication & Authorization

 All users must have unique login credentials with strong password
policies.

 Role-Based Access Control (RBAC) must be enforced, ensuring users


only have the minimum necessary access.

D. Access Review & Revocation

 Access rights must be reviewed quarterly by department heads and IT


Security.

 Accounts must be disabled or removed immediately upon employee


exit or role change.

 Privileged access accounts must be subject to stricter monitoring and


periodic re-approval.

E. Emergency Access & Exception Handling

 Temporary access for emergency situations requires approval from


senior management and IT Security.

 Emergency access logs must be reviewed post-event.


4. Access Approval Matrix

Requested Final
Access Type Approved By
By Authorization

General System Access Employee Department Head IT Security

Administrative Access IT Staff IT Manager Director

HR System Access HR Employee HR Manager Director

Vendor Department Head &


External Vendor Access Director
Sponsor IT Sec

Emergency Privileged
IT Admin Director & IT Security MD
Access

5. Compliance & Monitoring

 All access requests and approvals must be logged and auditable.

 Periodic access audits will be conducted to ensure compliance with


Medryte security policies.

 Violations of this policy may result in disciplinary action, including


revocation of access privileges.

6. Review & Updates This document will be reviewed annually to align with
Medryte’s evolving security requirements.

Document Version History


This table shows a record of significant changes to the document.
Versio Date Author Description of Change
n
05-Aug-
1.0 Selva Kumar Initial release
2023

02-Aug-
1.1 Selva Kumar Version Update
2024

APPROVALS

This table shows the approvals on this document for circulation, use, and
withdrawal.
Versio Date Approver Title/ Approval Remarks
n Authority
1.0 07-Aug- Mr.Sujin Jekash Simson MD Verified
2023
1.1 05-Augr- Mr.Sujin Jekash Simson MD Verified
2024

Approval & Acknowledgment I acknowledge that I have read and


understood the Medryte Access Management Process and Approval Matrix
and agree to comply with its guidelines.

Employee Signature: __________________________


Date: ___________________________

You might also like