Theinstitutionshalllimitsystemaccesstoauthorizedusers,processesactingonbehalfof authorized users, and devices (including other systems).
Theinstitutionshalllimitsystemaccesstothetypesoftransactionsandfunctionsthatauthorized users are permitted to execute (role-based access control).
Theinstitutionshallhaveaprocedureforremovalofaccessrights(termination)foralldeparting orresigningpersonnel,bothemployeesandcontractors/thirdparties.Thisprocedureshall coordinatemanagementdecisionswiththesystemadministrator/personnelwhoisresponsiblefor executing system access termination.
In case of malicious activity done by the employee, or contractor (third-party employee), access rights shall be immediately revoked according to the incident response procedure.