• Home
  • BVSSH
  • C4E
  • Playbooks
  • Frameworks
  • Good Reads
Search

What are you looking for?

Standard : Access design is reviewed whenever system boundaries change

Purpose and Strategic Importance

This standard ensures access control is reviewed whenever system boundaries change, maintaining secure-by-design principles as systems evolve. It helps teams proactively manage risk and uphold least-privilege access.

Aligned to our "Zero Trust Architecture" policy, this standard reduces the likelihood of unauthorised access and strengthens system resilience. Without it, access models drift, vulnerabilities grow, and trust is compromised.

Strategic Impact

  • Improved consistency and quality across teams
  • Reduced operational friction and delivery risks
  • Stronger ownership and autonomy in technical decision-making
  • More inclusive and sustainable engineering culture

Risks of Not Having This Standard

  • Slower time-to-value and increased rework
  • Accumulation of inconsistency and process debt
  • Reduced trust in engineering data, systems, or ownership
  • Loss of agility in the face of change or failure

CMMI Maturity Model

Level 1 – Initial

Category Description
People & Culture Awareness of access risks is low.
Reviews are reactive or absent.
Process & Governance No defined process for reviewing access during changes.
Technology & Tools Permissions evolve organically without structure or oversight.
Measurement & Metrics No tracking of access scope, risk, or review frequency.

Level 2 – Managed

Category Description
People & Culture Some teams initiate access reviews during major changes.
Behaviour is experience-driven.
Process & Governance Change advisory processes sometimes include access checks.
Technology & Tools Basic checklists or manual reviews are used.
Measurement & Metrics Partial tracking of review activities or incidents.

Level 3 – Defined

Category Description
People & Culture Teams understand and apply least-privilege principles.
Process & Governance Access reviews are built into boundary change workflows.
Technology & Tools Tools or templates support structured access management.
Measurement & Metrics Completion of access reviews is monitored and reported.

Level 4 – Quantitatively Managed

Category Description
People & Culture Teams proactively flag and resolve access issues.
Process & Governance Access reviews are auditable and enforced by policy.
Technology & Tools Dashboards show permission drift, unused roles, or violations.
Measurement & Metrics Trends in access scope, change frequency, and issue resolution are reported.

Level 5 – Optimising

Category Description
People & Culture Access awareness is embedded in system ownership and architecture decisions.
Process & Governance Continuous improvement cycles reduce friction and strengthen compliance.
Technology & Tools Automated tooling enforces and remediates access misconfigurations.
Measurement & Metrics Access quality is benchmarked, with continuous feedback driving Zero Trust maturity.

Key Measures

  • % of system changes accompanied by access review
  • % of permissions reviewed or adjusted during boundary changes
  • Reduction in over-permissioning or access violations
  • Time to detect and remediate access drift
Associated Policies
  • Architect for Change
  • Secure by Design
Associated Practices
  • End-to-End (E2E) Testing
  • Contract Testing
  • CQRS (Command Query Responsibility Segregation)

Technical debt is like junk food - easy now, painful later.

Awesome Blogs
  • LinkedIn Engineering
  • Github Engineering
  • Uber Engineering
  • Code as Craft
  • Medium.engineering