Introduction
In this blog, I share details on how to go about initiating an access review and managing the initiative. To find out more about access reviews, you can review my other blog.
Step 1: Define the Scope and Goals
To begin with the access review project, you need to set its scope and objectives. This means identifying the systems, apps, and data you’ll look at. Make sure to spell out what you want to achieve, like following compliance rules, cutting down on security threats, and making access management processes better.
Step 2: Identify Risks
Spotting the risks plays a key role in making the access review project work. Some common types of risks include people getting in without permission, accounts left behind with too many rights given, and not complying with the rules. Do a risk assessment to rank these risks and mitigate them accordingly.
Step 3: Assemble the Project Team
For an access review project to succeed, you need a team that has clearly defined roles.
Your project team should have the following roles:
Roles and Responsibilities
Project Manager
The Project Manager has the job of watching over the whole access review project. They make sure it finishes on schedule and doesn’t go over budget. They communicate with stakeholders, handle resources, and keep an eye on how things are going.
Access Review Lead
The Access Review Lead has the job of planning and carrying out the access review process. They team up with the Project Manager to set review standards, collect access info, and look at the outcomes.
IT Security Analyst
The IT Security Analyst is responsible for identifying and assessing security risks related to access management. They provide expertise on security best practices and help develop mitigation strategies.
Compliance Officer
The Compliance Officer ensures that the access review process complies with relevant regulations and standards. They provide guidance on compliance requirements and help address any compliance issues that arise during the review.
System Owners
System Owners are responsible for the systems and applications being reviewed. They provide access data, assist with the review process, and implement any necessary changes to access controls.
Step 4: Develop a Review Plan
Develop a detailed review plan that outlines the steps and timeline for the access review project.
The plan should include the following components:
- Review criteria and objectives
- Data collection methods
- Analysis and reporting procedures
- Communication plan
- Timeline and milestones
Step 5: Execute the Access Review
With the review plan in place, it’s time to execute the access review. This involves collecting access data, analyzing the data to identify any issues, and documenting the findings. Ensure that the review process is thorough and that all stakeholders are kept informed of progress and findings.
Step 6: Address Findings and Implement Changes
Once the access review is complete, address any findings and implement necessary changes to access controls. This may involve revoking unnecessary access, updating access policies, and improving access management processes.
Join Netwoven’s 2-Day IAM Workshop and master Access Review with Microsoft Entra ID

Conclusion
Initiating an access review project is a critical step in ensuring effective identity governance and access management. By following these steps, identifying risks, and assembling a dedicated project team, organizations can improve their access controls, reduce security risks, and ensure compliance with regulatory requirements.