A simple register to track who has access and reduce third-party risk.
Know who has access to your systems, why they have it, and whether it’s protected (MFA, least privilege, time limits).
| Vendor | System(s) | Access method | Account type | MFA? | Last used | Owner | Expiry/review |
|---|---|---|---|---|---|---|---|
| __________ | __________ | VPN / Portal / Remote tool | Named / Shared | Yes/No | __________ | __________ | __________ |
| __________ | |||||||
| __________ |
| Control | Target | Status | Notes |
|---|---|---|---|
| Named accounts only | No shared vendor credentials | ☐ | |
| MFA enforced | All vendor access requires MFA | ☐ | |
| Least privilege | Access limited to needed systems only | ☐ | |
| Time-bound access | Disable after work completes (where feasible) | ☐ | |
| Logging | Record sessions / audit access | ☐ |
Copy/paste into your internal policy pack:
All third-party access must be approved by a system owner, use named accounts with MFA, and be limited to the minimum necessary privileges. Access is reviewed quarterly and removed when no longer required.
No hard sell - just clarity and practical next steps.
hello@virtusgroup.biz