What access control & identity management are
Access control defines who can access which data, systems, and functions—and under what conditions. Identity management (often called IAM: Identity & Access Management) ensures each user or system has a unique identity and appropriate permissions throughout its lifecycle.
In data protection, access control is a core safeguard. Personal data should only be accessible to authorized individuals whose roles require it.
Why limiting access is a core privacy control
Even with strong encryption and contracts, excessive internal access can create major risk. Access control reduces the likelihood and impact of unauthorized use, insider incidents, and accidental disclosure.
Risks caused by weak access control
- Insider misuse: curious browsing of customer or employee records.
- Excessive exports: large datasets downloaded unnecessarily.
- Privilege creep: users accumulate access over time without review.
- Leaver risk: ex-employees retain access after departure.
Core principles (least privilege & need-to-know)
Strong access control rests on simple principles applied consistently.
- Least privilege: grant the minimum permissions required for a task.
- Need-to-know: access only if the role requires specific data.
- Segregation of duties: separate roles to avoid conflicts (e.g., data export vs approval).
- Default deny: access is not granted unless explicitly assigned.
- Strong authentication: MFA for sensitive systems and admin roles.
Access control models (RBAC, ABAC, etc.)
Different models structure how permissions are assigned. SMEs often start with role-based access control (RBAC).
| Model | Description | Use case |
|---|---|---|
| RBAC (Role-Based Access Control) | Permissions assigned to roles; users assigned to roles | Most common for SMEs; easy to manage |
| ABAC (Attribute-Based Access Control) | Access based on attributes (department, region, clearance) | Larger orgs; complex environments |
| DAC (Discretionary Access Control) | Resource owners decide who can access | File shares; smaller systems (risk of inconsistency) |
| Privileged Access Management (PAM) | Special controls for admin/superuser accounts | High-risk environments; sensitive systems |
Identity lifecycle management (joiner/mover/leaver)
Identity governance must cover the full lifecycle of a user account. The most common access failures occur during role changes or offboarding.
Joiner (new employee)
- Create a unique account linked to HR records.
- Assign predefined role-based permissions.
- Enforce MFA before granting sensitive access.
Mover (role change)
- Review existing access.
- Remove permissions no longer required.
- Assign new role-based access aligned to updated responsibilities.
Leaver (departure)
- Immediate account deactivation.
- Revoke tokens, VPN access, SSO sessions.
- Rotate shared credentials if necessary.
- Review recent activity logs (risk-based).
Monitoring, logging & access reviews
Access control is not set-and-forget. Continuous monitoring and periodic reviews reduce privilege creep.
Key controls
- Access logs: record who accessed what and when.
- Admin monitoring: track privileged account usage.
- Quarterly/annual access reviews: managers confirm role appropriateness.
- Export controls: log and review bulk data exports.
- Anomaly detection: alert on unusual access patterns.
Helpful tools (optional)
If you need traceable approvals for role changes, privileged access, or export authorizations:
Disclaimer: Links are for convenience; choose tools based on your requirements and compliance obligations.
Access control checklist (copy/paste)
- All users have unique, traceable accounts (no shared credentials).
- Access is role-based and aligned to job responsibilities.
- MFA is enforced for sensitive systems and admin roles.
- Joiner/mover/leaver processes are documented and triggered automatically where possible.
- Privileged accounts are restricted and monitored separately.
- Access reviews are conducted periodically and documented.
- Bulk exports and admin actions are logged and reviewed.
- We can explain why each high-risk user has the access they hold.
FAQ
What is the difference between authentication and access control?
How often should we review user access?
What is least privilege access?
Is MFA mandatory?
Sources & further reading
- GDPR (Regulation (EU) 2016/679) – EUR-Lex
- NIST Digital Identity Guidelines
- ISO/IEC 27002 – Access control controls
- Swiss Federal Act on Data Protection (FADP) – Fedlex
Last updated: February 22, 2026 • Version: 1.0