Identity & Access · IA-Q12

Question

Is third-party/vendor access time-bound, MFA-enforced, brokered where needed, and monitored?

Why This Matters

Vendors are frequent intrusion vectors; governance narrows exposure and aids forensics.

Maturity

How to Level Up

| From → To | Actions | |—|—| |0 → 2| Register all vendor identities; timebox by default.| |2 → 3| Enforce JIT + approvals; central logging.| |3 → 4| Add MFA/device posture; session recording.| |4 → 5| Broker via PAM; continuous analytics and alerts.|

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

Common Pitfalls

Compliance Mapping