The risk of terminated employee accounts maintaining access is that the former employees or unauthorized parties may use the accounts to access or manipulate the organization’s information systems or resources, and cause harm or damage to the organization and its stakeholders, such as data loss, data breach, system failure, fraud, etc.
The first step to address the risk of terminated employee accounts maintaining access is to disable user access, which means to revoke or remove the permissions or privileges that allow the accounts to access or use the organization’s information systems or resources. Disabling user access can help the organization to address the risk by providing the following benefits:
It can prevent or stop the former employees or unauthorized parties from accessing or using the organization’s information systems or resources, and reduce or eliminate the potential harm or damage that they may cause for the organization and its stakeholders.
It can ensure the confidentiality, integrity, availability, and reliability of the organization’s information systems or resources, and protect them from unauthorized access or manipulation.
It can provide useful evidence and records for the verification and validation of the organization’s access control function, and for the compliance with the organization’s access control policies and standards.
The other options are not the first steps to address the risk of terminated employee accounts maintaining access, because they do not provide the same level of urgency and effectiveness that disabling user access provides, and they may not be sufficient or appropriate to address the risk.
Performing a risk assessment is a process of measuring and comparing the likelihood and impact of various risk scenarios, and prioritizing them based on their significance and urgency. Performing a risk assessment can help the organization to understand and document the risk of terminated employee accounts maintaining access, but it is not the first step to address the risk, because it does not prevent or stop the former employees or unauthorized parties from accessing or using the organization’s information systems or resources, and it may not be timely or feasible to perform a risk assessment before disabling user access.
Developing an access control policy is a process of defining and describing the rules or guidelines that specify the expectations and requirements for the organization’s access control function, such as who can access what, when, how, and why. Developing an access control policy can help the organization to establish and communicate the boundaries and objectives for the organization’s access control function, but it is not the first step to address the risk, because it does not prevent or stop the former employees or unauthorized parties from accessing or using the organization’s information systems or resources, and it may not be relevant or applicable to the existing or emerging risk scenarios that may affect the organization’s access control function.
Performing a root cause analysis is a process of identifying and understanding the underlying or fundamental causes or factors that contribute to or result in a problem or incident that has occurred or may occur in the organization. Performing a root cause analysis can help the organization to address and correct the risk of terminated employee accounts maintaining access, and prevent or reduce its recurrence or impact, but it is not the first step to address the risk, because it does not prevent or stop the former employees or unauthorized parties from accessing or using the organization’s information systems or resources, and it may not be timely or feasible to perform a root cause analysis before disabling user access. References =
ISACA, CRISC Review Manual, 7th Edition, 2022, pp. 40-41, 47-48, 54-55, 58-59, 62-63
ISACA, CRISC Review Questions, Answers & Explanations Database, 2022, QID 207
CRISC Practice Quiz and Exam Prep