|
| 1 | +--- |
| 2 | +page_title: Define access requirements |
| 3 | +description: Identify and collect requirements to help you identify access requirements for your systems. |
| 4 | +--- |
| 5 | + |
| 6 | +# Define access requirements |
| 7 | + |
| 8 | +Defining access requirements for your organization is an important step in |
| 9 | +creating secure systems. Identifying what requirements you need to implement can |
| 10 | +seem overwhelming. There are steps you can take to simplify identifying the |
| 11 | +requirements you need and collecting the necessary documentation to implement |
| 12 | +the access requirements. |
| 13 | + |
| 14 | +## What are access requirements |
| 15 | + |
| 16 | +Every system you interact with today includes a set of access requirements. These |
| 17 | +requirements define who can access the system, what actions they can take, and |
| 18 | +under what conditions they can access the system. Access requirements come from |
| 19 | +several sources, including: |
| 20 | + |
| 21 | +- Industry regulations that define role-based access controls or separation of |
| 22 | + duties requirements (PCI, HIPAA). |
| 23 | +- Local, federal, or international regulatory standards that define data privacy |
| 24 | + and protection (CCPA, Sarbanes-Oxley, GDPR). |
| 25 | +- Current best operational practices that define security controls (SOC 2, NIST, |
| 26 | + ISO 27001). |
| 27 | + |
| 28 | +When you understand which regulations and standards apply to your organization, you can |
| 29 | +begin to identify the specific access requirements that you need to implement |
| 30 | +for your systems and teams. |
| 31 | + |
| 32 | +## How to define access requirements |
| 33 | + |
| 34 | +Start by identifying the regulations and standards that apply to your |
| 35 | +organization from both an industry and geographic perspective. These regulations |
| 36 | +often align with specific security practices, such as [NIST SP |
| 37 | +800-53](https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final) for access control. |
| 38 | + |
| 39 | +Once you have identified and collected the requirements that apply to your |
| 40 | +organization, you need to document those requirements and begin mapping the |
| 41 | +specific access controls to your systems and teams. Documenting these |
| 42 | +requirements helps you ensure that you are meeting the necessary regulations and |
| 43 | +standards. |
| 44 | + |
| 45 | +You should also designate a group responsible for staying up-to-date on changes to |
| 46 | +regulations and standards that may affect your access requirements. When |
| 47 | +regulations, standards, or best practices change, you need to update your access |
| 48 | +requirements accordingly. The group responsible for staying up-to-date on |
| 49 | +regulation updates evangelizes the need for strong security practices across |
| 50 | +your organization. |
| 51 | + |
| 52 | +Documenting and maintaining your access requirements helps you ensure that you |
| 53 | +can meet audit requirements, such as those for SOC 2 or ISO 27001. Auditors will |
| 54 | +want to see that you have a clear understanding of your access requirements and |
| 55 | +that you are implementing the necessary controls to meet those requirements. |
| 56 | + |
| 57 | +As you begin defining your access requirements, also think about how you can |
| 58 | +manage these controls at scale. HashiCorp's Terraform helps you deploy [policies |
| 59 | +as code](/well-architected-framework/secure-systems/compliance-and-governance/policy-as-code) |
| 60 | +such as policies for Vault or Sentinel to manage access controls across your |
| 61 | +systems. |
| 62 | + |
| 63 | +[Project |
| 64 | +infragraph](https://www.hashicorp.com/en/blog/building-intelligent-infrastructure-automation-with-hashicorp), |
| 65 | +announced at HashiConf 2025, is a real-time infrastructure graph that provides |
| 66 | +visibility into your infrastructure and its relationships. By understanding |
| 67 | +relationships between your resources, you can better define and manage access |
| 68 | +requirements. |
| 69 | + |
| 70 | +You can apply to our private beta for project infragraph |
| 71 | +[here](https://www.hashicorp.com/en/project-infragraph-private-beta). |
| 72 | + |
| 73 | +HashiCorp resources: |
| 74 | + |
| 75 | +- [Access controls with Vault policies](/vault/tutorials/policies/policies) |
| 76 | +- [Policy as code with Sentinel](/sentinel/docs/concepts/policy-as-code) |
| 77 | +- [Create IAM policies with Terraform](/terraform/tutorials/aws/aws-iam-policy) |
| 78 | +- [Use templates with Waypoint](/waypoint/tutorials/hcp-waypoint/use-template) |
| 79 | + |
| 80 | +External resources: |
| 81 | + |
| 82 | +- [NIST cybersecurity framework](https://www.nist.gov/cyberframework) |
| 83 | +- [Define, update, share, and enforce policies using code](https://developer.ibm.com/articles/policy-as-code-ansible-automation-engine-and-open-policy-agent/) |
| 84 | +- [Understanding separation of duties](https://www.pingidentity.com/en/resources/blog/post/separation-of-duties.html) |
| 85 | + |
| 86 | +## Next steps |
| 87 | + |
| 88 | +Following these documents in order ensures a logical progression through the key |
| 89 | +concepts and best practices, helping you build a strong foundation to build your |
| 90 | +identity and access management program. |
| 91 | + |
| 92 | +- **Define access requirements (this document)** |
| 93 | +- [Grant least privilege](/well-architected-framework/secure-systems/identity-access-management/grant-least-privilege) |
| 94 | +- [Create permissions and guardrails](/well-architected-framework/secure-systems/identity-access-management/create-permissions-guardrails) |
| 95 | +- [Centralize identity management](/well-architected-framework/secure-systems/identity-access-management/centralize-identity-management) |
| 96 | +- [Implement strong sign-in workflows](/well-architected-framework/secure-systems/identity-access-management/implement-strong-sign-in-workflows) |
| 97 | +- [Use dynamic credentials](/well-architected-framework/secure-systems/identity-access-management/use-dynamic-credentials) |
| 98 | +- [Manage access lifecycle](/well-architected-framework/secure-systems/identity-access-management/manage-access-lifecycle) |
| 99 | + |
| 100 | +In this section of Identity and access management, you learned the importance |
| 101 | +of identifying and collecting access requirements from common sources such as |
| 102 | +industry and regulatory standards. Identity and access management is part of the |
| 103 | +[Secure systems](/well-architected-framework/secure-systems) pillar. |
0 commit comments