Today’s Lesson
Security for Legal SaaS — Episode 57: Access Reviews and Least Privilege Audits
The Accounts Nobody Remembers
Every legal SaaS platform accumulates permissions like a law firm accumulates filing cabinets — slowly, silently, and with nobody tracking what went in six months ago. A contract developer gets database access for a migration project. An associate joins a matter team and receives case file permissions. Both move on. The access stays. This is permission drift, and it is one of the most common findings in every compliance audit.
SOC 2 Trust Services Criteria CC6.2 requires that service organisations conduct periodic reviews of user access to confirm that permissions remain appropriate.1 ISO 27001:2022 Annex A 9.2.5 mandates review of user access rights at regular intervals, with privileged access reviewed more frequently.2 These are not suggestions — they are control objectives that auditors verify with evidence.
Key concept: An access review (sometimes called a user access review or entitlement review) is a systematic audit of who has access to what, confirming that every active permission is still justified by a current business need. It is a core control in SOC 2, ISO 27001, and most data protection frameworks.
The Principle of Least Privilege — Revisited
We first introduced the principle of least privilege back in Episode 8 when discussing database security: grant only the minimum permissions necessary for a task. In the context of access reviews, least privilege is both the standard you measure against and the goal you work towards.
There are two approaches to implementing least privilege:
| Approach | Description | Risk Profile |
|---|---|---|
| Start minimal, add on request | Users begin with zero permissions and request access as needed | Lower risk, higher friction. Users may wait for approvals |
| Start broad, remove over time | Users receive role-based defaults and excess permissions are trimmed during reviews | Higher initial risk, lower friction. Relies on reviews actually happening |
The first approach is safer. The second is what most organisations actually do — and it only works if access reviews are rigorous and regular.
What an Access Review Covers
A thorough access review examines every layer of your permission model:
User accounts. Are all active accounts tied to current employees, contractors, or service accounts with a documented purpose? A 2024 investigation by Zluri found that 40% of enterprise SaaS organisations had active accounts belonging to former employees — accounts that represent open doors to sensitive data.3
Role assignments. Does each user's role match their current job function? A junior associate who was temporarily elevated to admin during a system migration should not retain admin privileges three months later.
Privileged accounts. Admin accounts, database access, infrastructure credentials, and API keys with elevated permissions require monthly review, not quarterly. NIST SP 800-53 AC-2 specifically calls for organisations to review accounts for compliance with account management requirements on a defined frequency.4
Service accounts and API keys. These are the accounts nobody thinks about. A service account created for a decommissioned integration that still has read access to your entire document store is a breach waiting to happen.
Shared credentials. Any shared passwords, team API keys, or group login accounts. These should be eliminated wherever possible and flagged for immediate remediation when found during a review.
Review Frequency
| Account Type | Recommended Frequency | Compliance Basis |
|---|---|---|
| Privileged / Admin | Monthly | SOC 2 CC6.2, ISO 27001 A.8.2 |
| Standard user accounts | Quarterly | SOC 2 CC6.2, ISO 27001 A.9.2.5 |
| Service accounts / API keys | Quarterly | NIST SP 800-53 AC-2 |
| Third-party integrations | On change + quarterly | SOC 2 CC6.6 |
| Emergency / break-glass accounts | After every use | SOC 2 CC6.1 |
AccessOwl's best practice guide recommends that access reviews also be triggered by events — role changes, project completion, department transfers — not just calendar schedules.5
Offboarding: The Critical Access Review
The most time-sensitive access review is offboarding. When an employee or contractor departs, every access point must be revoked — not next week, not at the end of the pay cycle, but within hours. For a legal SaaS platform, this includes:
- Application accounts — disable login, revoke active sessions
- API keys and tokens — rotate or revoke any keys the departing user created or had access to
- OAuth grants — revoke delegated access tokens (as we covered in Episode 20)
- Shared credentials — rotate any passwords the user knew
- Cloud infrastructure access — remove IAM roles, SSH keys, VPN certificates
- Device management — remote wipe if the user had company data on personal devices
- Code repository access — remove from GitHub/GitLab organisations
- Third-party SaaS — remove from Slack, project management tools, document sharing
Real-world failure: The Colonial Pipeline ransomware attack (2021) exploited a dormant VPN account that had never been deactivated after the employee left. No MFA, no access review, no offboarding checklist. One forgotten account caused a shutdown of nearly half the fuel supply to the US East Coast.6
Automating Access Reviews
Manual access reviews — downloading a spreadsheet of users, emailing managers, chasing responses — do not scale. Modern platforms automate the process:
Automated detection flags stale accounts (no login in 90 days), over-provisioned roles (permissions never exercised), and orphaned service accounts (created by departed users). Tools like Zluri, Vanta, and Drata integrate with your identity provider and SaaS applications to surface these automatically.3
Manager certification workflows send each manager a list of their direct reports' permissions and require explicit approval or revocation — with an audit trail showing who approved what and when.
Just-in-time access replaces permanent elevated permissions with temporary grants. A developer who needs production database access for a debugging session gets it for two hours, with automatic revocation. This eliminates the permission drift that makes access reviews necessary in the first place.
Evidence for Auditors
Access reviews are only as valuable as the evidence they produce. SOC 2 and ISO 27001 auditors expect:
- Documented policy — who reviews, how often, what triggers a review, and what happens to findings
- Review records — timestamped evidence showing reviews were conducted on schedule
- Remediation evidence — proof that findings (stale accounts, over-provisioned access) were resolved within a defined timeframe
- Exception documentation — if any user retains access that violates least privilege, a documented business justification with a review date
Without this evidence trail, you have not conducted an access review in any meaningful compliance sense — you have just looked at a list.
What's Next
Episode 58 covers Insider Threats and Employee Access — what happens when the attacker already has legitimate credentials, and how to detect access patterns that are technically authorised but behaviourally anomalous.
Sources & Further Reading
Sources & references
- ISMS.online, Enforcing SOC 2 Access Controls Effectively — SOC 2 CC6.2 access review requirements.
- ISMS.online, ISO 27001 Annex A.9: Access Control — periodic review of user access rights.
- Zluri, User Access Review Policy: What to Document for PCI DSS, HIPAA, ISO 27001, SOC 2, & SOX — access review policy requirements and stale account statistics.
- NIST, SP 800-53 AC-2: Account Management — review accounts for compliance with account management requirements.
- AccessOwl, User Access Reviews: Best Practices for Successful Audits — event-driven and scheduled review cadence.
- Wikipedia, Colonial Pipeline Ransomware Attack — dormant VPN account exploited due to no access review.
- Konfirmity, SOC 2 Role-Based Access Control — RBAC and least privilege enforcement.
- Neumetric, ISO 27001 Access Control Requirements for Enforcing Least Privilege — Annex A access control deep dive.
- HighTable, ISO 27001:2022 Annex A 8.2 Privileged Access Rights — privileged access review requirements.
- AccessOwl, Access Controls for SOC 2 & ISO 27001 — cross-framework access control comparison.