PROCEDURE TEMPLATE
Access Review Procedure
Create a documented access review procedure meeting cyber insurance carrier requirements for Coalition, Hartford, Beazley, and Travelers.
What this cyber insurance requirement is
Cyber carriers expect documented proof that you regularly audit who has access to what. Compromised credentials are in nearly 80% of breaches. Access reviews prevent privilege creep and enforce least-privilege principles. This template guides you through creating a procedure that identifies review frequency, deprovisioning timelines, role-based access control implementation, and approval workflows that satisfy major carriers.
Create your access review procedure below
What you'll get
- A customized access review procedure document (4-6 pages)
- Review frequency & schedule aligned with your identity provider
- Account disable SLA & deprovisioning checklists
- RBAC implementation guidelines & least-privilege principles
- Approver workflow & sign-off requirements
- Systems in scope & exception handling procedures
What carriers are looking for
Each carrier asks slightly different questions. Here are some named artifacts by carrier.
Coalition
- Review frequency, inactive account identification, least-privilege principles, role-based access control (RBAC) implementation
- Access review procedure documentation
- RBAC implementation status
Hartford
- Provisioning documentation, employee deprovisioning procedures, account disable SLAs, approver sign-offs
- Provisioning policy and deprovisioning checklist
Beazley
- RBAC implementation status, access review frequency, privileged account management, exception documentation
- Privileged account management controls
Travelers
- Documented and signed access reviews, deprovisioning timelines, system owner certification of access necessity
- Signed reviews and deprovisioning timeline evidence
What to collect
Evidence artifacts your broker will need during the renewal process.
📊
Access Review Reports
Identity provider reports (Entra ID, Okta, Google Workspace, JumpCloud) showing access lists and approval dates
📋
Audit Logs
Terminated user audit logs showing disable timestamps and enforcement within your stated SLA
🔐
RBAC Configuration
Screenshots or documentation showing role definitions, group membership, and permission assignments
✅
Offboarding Checklists
Completed offboarding templates for 2-3 recent employee terminations showing account disable steps
📝
Exception Documentation
Logs of access exceptions with compensating controls and approver authorization
🖊️
Signed Reviews
Evidence of approver sign-off on quarterly or semi-annual access reviews with dates and names
Important: What this doesn't prove
Be upfront about these gaps. Carriers appreciate honesty over overstatement.
Reviews Actually Happen: A documented procedure doesn't prove that reviews actually occur on schedule or are thorough
Accounts Actually Disable: Even with an SLA, accounts may not disable within the stated timeframe consistently
RBAC is Correct: Role definitions may not actually enforce least-privilege or prevent privilege escalation
Access is Still Necessary: Reviews validate against policy, not whether every approved access was truly required for the job
Exceptions Have Controls: Documentation of exceptions doesn't verify that compensating controls are actually working
Technical Enforcement: Carriers increasingly ask for technical evidence alongside policy documents
Who owns what
🏢Insured
Owns the policy governance and approval workflow. Responsible for ensuring business owners/managers sign off on quarterly access reviews and certify access necessity. Approves exceptions and compensating controls.
🔧MSP / IT Department
Configures and maintains identity provider (Entra ID, Okta, etc.). Executes quarterly access reviews, maintains deprovisioning checklists, disables accounts within SLA, and provides evidence reports for carriers.
🤝Broker
Gathers review evidence from IT/MSP, submits reports to carriers, explains technical implementation details, and addresses carrier questions about access controls and deprovisioning timelines.
Frequently Asked Questions
How often should we conduct access reviews?
What's a reasonable account disable SLA?
Should we use RBAC or individual access assignments?
Who should approve access reviews?
What do we do with access exceptions?
How do we document proof of reviews for carriers?
Sources (March 2026)
- Coalition Underwriting Standards — Access review frequency and RBAC implementation requirements
- Hartford Cyber Security Questionnaire — Provisioning, deprovisioning, and SLA documentation
- Beazley Security Assessment — Privileged account management and exception controls
- Travelers Cyber Risk Assessment — Access review sign-off and deprovisioning timelines
- NIST Cybersecurity Framework (SC-7) — Access control and least-privilege principles
- CIS Controls v8 — Access control and user provisioning/deprovisioning procedures