Vendor Access Register + Third‑Party
Access Checklist

A simple register to track who has access and reduce third-party risk.

Goal

Know who has access to your systems, why they have it, and whether it’s protected (MFA, least privilege, time limits).

1) Vendor access register (template)

VendorSystem(s)Access methodAccount typeMFA?Last usedOwnerExpiry/review
____________________VPN / Portal / Remote toolNamed / SharedYes/No______________________________
__________
__________

2) Access hardening checklist

ControlTargetStatusNotes
Named accounts onlyNo shared vendor credentials
MFA enforcedAll vendor access requires MFA
Least privilegeAccess limited to needed systems only
Time-bound accessDisable after work completes (where feasible)
LoggingRecord sessions / audit access

3) Review cadence

4) Simple vendor access policy statement

Copy/paste into your internal policy pack:

All third-party access must be approved by a system owner, use named accounts with MFA, and be limited to the minimum necessary privileges. Access is reviewed quarterly and removed when no longer required.

Note: This document is general operational guidance and does not replace legal advice. It helps you establish a practical baseline and reduce common privacy risks.
👉 Free 30-minute consultation

No hard sell - just clarity and practical next steps.

hello@virtusgroup.biz
virtusgroup.co.nz
0800 847 887 (VIRTUS)

Book now