Information Technology
ISO 27001 Quarterly Access Review
ISO 27001 / SOC 2 quarterly user access review: identity inventory, manager attestation, privileged access review, SoD conflict analysis, excess access revocation, and audit-ready evidence archival.
14steps
14connections
Process steps
1
Pull User Access List Across Systems
IT Security · Okta + AWS IAM + custom scripts
2
Categorize by Role and Risk
IT Security · Okta + Excel
3
Manager Review of Direct Reports
Managers · Okta Workflows
4
Privileged Access Review
CISO · Okta + AWS IAM
5
Document Justification
Managers · Okta Workflows
6
Revoke Excess Access
IT Security · Okta + AWS IAM
7
SoD Conflict Analysis
IT Security · SailPoint
8
Generate Review Report
IT Security · Okta + Excel
9
CISO Sign-Off
CISO · OneTrust GRC
10
Evidence Archived for Audit
IT Security · OneTrust GRC
11
Findings Logged in GRC
IT Security · OneTrust GRC
Related templates
IT Incident Management
ITIL-based incident management from detection to post-mortem.
Release Management
Software release management from planning through deployment to production.
GDPR Data Subject Request
Compliant GDPR Data Subject Access Request workflow: identity verification, request categorization, data discovery across systems, legal review, deletion handling, and audit trail archival.
Need a custom process?
Upload any document (meeting notes, SOPs, emails) and LucidFlow's AI will generate a BPMN diagram automatically.
Try for free