All Posts
Aramco Cybersecurity Compliance 3 Views 10 min read

What Is Access Control in SACS-210? An IT Manager’s Guide

Last Updated May 2, 2026
Access Control SACS-210 compliance guide for IT Managers TPC1.9 TPC1.12

IT Managers in Saudi Arabia face the daunting task of translating corporate policy into technical reality. When preparing your infrastructure for the Saudi Aramco Cybersecurity Compliance Certificate (CCC), a critical question arises: what is access control in the eyes of an auditor? It is much more than just issuing passwords; it is the comprehensive, documented technical enforcement of who can access your systems, what they can do once inside, and how that access is continuously monitored. Drafting these policies from scratch and failing to map them to operational evidence can drain hundreds of hours from your department. Without proper documentation and technical logs, audit rejection is an imminent threat. This guide eliminates the guesswork, breaking down exactly how to align your Active Directory, MFA configurations, and employee lifecycle management with the SACS-210 (February 2026) General Requirements to ensure you are auditor-ready on day one.

5 Key Takeaways

  • Centralized IAM is Mandatory: You must use Active Directory (or an equivalent IAM solution) to centralize user authorizations and enforce the principle of least privilege (TPC1.9).
  • MFA is Non-Negotiable: Multi-factor authentication must be actively enforced for all remote access, cloud services, and privileged administrator accounts (TPC1.12).
  • Stop Orphaned Accounts: Formal, documented IT sign-offs during employee onboarding and offboarding are required to prevent unauthorized access (TPC1.4).
  • Audit Your Access: IT must conduct and document a formal review of all user accounts and access rights at least annually (TPC1.15).
  • Restrict Local Admins: Standard users must be restricted from having local administrator rights on their workstations to prevent unauthorized software installations and policy modifications.
3D isometric centralized IAM gateway for SACS-210 access control compliance TPC1.9

The Foundation: What Is Access Control in the CCC Context?

IT teams often rely on decentralized credentials, local workstation accounts, or shared administrative logins out of convenience. Auditors immediately flag these practices. Without a centralized directory, it is impossible to enforce Role-Based Access Control (RBAC) or adequately segregate duties.

Control Reference: TPC1.9 – Centralized IAM & Access Control.

Why auditors reject this: Shared generic accounts strip away individual accountability, making it impossible to determine who performed a specific action on the network. Furthermore, without centralized management, revoking access across all systems simultaneously is highly prone to human error.

The Fix: Implement a centralized Active Directory environment. Utilize the Procedure for Grant of Access Letter and the master Cybersecurity Policy from the SACS-210 Compliance Kit to formally govern how IT grants access. This establishes the paper trail the auditor needs to verify your technical configurations.

3D isometric MFA mobile authentication for SACS-210 compliance TPC1.12

Enforcing Password and Authentication Management

Users frequently resist complex passwords, and legacy IT environments often lack native Multi-Factor Authentication (MFA). However, the standard is incredibly strict regarding how authentication must be handled.

Control Reference: TPC1.11 – Password and authentication management; TPC1.12 – Multi-factor authentication (MFA).

Why this matters: Passwords must be 8-64 characters in length and require alphanumeric complexity. More importantly, MFA is strictly required for all remote access (including VPNs and Remote Desktop), all cloud services (such as Microsoft 365 or Google Workspace), and all privileged accounts. Single sign-on (SSO) is permitted, but it must be coupled with MFA upon initial login.

The Fix: Force these configurations via Group Policy (GPO) and your IAM console. Use the kit’s Acceptable Use Policy (AUP) and the AUP Acknowledgment Form to legally bind users to these strict rules, giving IT the authority to enforce them without pushback.

3D isometric employee onboarding offboarding workflow for SACS-210 TPC1.4

The Employee Lifecycle: Onboarding and Offboarding

“Orphaned accounts” remain active long after an employee leaves the company, presenting a massive security vulnerability and an easy target for threat actors.

Control Reference: TPC1.4 – On-boarding and off-boarding process.

Why auditors reject this: Discovering an active account belonging to a former employee is an automatic major finding during a SACS-210 audit. It proves that IT and HR are disjointed and that the network is exposed.

The Fix: You must integrate the Employee Onboarding Checklist and Employee Offboarding Checklist templates into your HR and IT workflows. These forms provide explicit operational evidence that IT securely provisions unique credentials upon hire, and revokes network access, email, and VPNs immediately upon termination.

3D isometric annual access review audit process for SACS-210 compliance TPC1.15

Continuous Auditing and Access Reviews

Access creep occurs naturally in any organization; employees change roles, departments, or projects, retaining old privileges while gaining new ones. Over time, standard users accumulate administrative rights.

Control Reference: TPC1.15 – Review user accounts/access annually.

Why auditors reject this: IT managers often perform routine cleanups of Active Directory but fail to formally document the process. Auditors require hard, documented proof that a comprehensive review took place.

The Fix: Deploy the Access Review Report template from the compliance suite. This document formalizes your review of Active Directory, ERP systems, and Cloud applications. It outlines the scope, lists anomalies found (such as excessive permissions), and acts as the exact artifact the auditor will request to satisfy TPC1.15.

3D isometric audit logging and monitoring system for SACS-210 compliance TPC1.31

Logging, Monitoring, and Protecting Evidence

If unauthorized access occurs, IT cannot trace the origin, scope, or impact without proper logging mechanisms. Access control is meaningless if you cannot monitor it.

Control Reference: TPC1.31 – Audit and cybersecurity event logs.

Why this matters: Your systems must be capable of logging critical events such as successful and failed logins, addition or deletion of user accounts, escalation of privileges, and modifications to security policies. These logs must be synced to a unified Network Time Protocol (NTP) source and protected from unauthorized deletion or tampering.

The Fix: Configure your edge firewalls, Windows servers, and critical applications to forward logs to a centralized, restricted syslog server or SIEM. Use the Technical Implementation Checklist provided in the kit to ensure your IT infrastructure is capturing the exact event attributes (Timestamp, User ID, Source IP, etc.) mandated by Appendix C of the standard.

Access Control Prevention Checklist / Implementation Guide

To bridge the gap between policy and IT operations, ensure your technical team executes the following steps using the SACS-210 Compliance Kit templates:

  1. Deploy Centralized Directory: Ensure Active Directory (or equivalent) is fully operational to govern all workstation and server logins.
  2. Enforce GPOs: Configure Group Policy to mandate 8-64 character passwords, enforce screen lock timeouts (10-15 minutes), and block macro execution.
  3. Activate MFA universally: Turn on Multi-Factor Authentication for your Microsoft 365 tenant, all VPN portals, and IT administrator accounts.
  4. Operationalize HR Forms: Train HR to require IT sign-offs on the Employee Onboarding Checklist and Employee Offboarding Checklist for every personnel change.
  5. Conduct the Annual Audit: Download the Access Review Report template, review your active users against payroll, strip unnecessary permissions, and have the GM sign the final report.

Frequently Asked Questions

Q1: What is access control in the context of the SACS-210 General Requirements?
A: In SACS-210, access control (TPC1.9) is the technical and administrative enforcement of user identities, ensuring access is granted on a “Need-to-Know” basis using unique credentials and centralized management like Active Directory.

Q2: Does SACS-210 require MFA for standard office workers?
A: MFA is strictly mandated for all remote access (VPNs), cloud services (like company email), and privileged/administrative accounts (TPC1.12).

Q3: Can my IT department use shared administrator accounts to manage servers?
A: No. TPC1.10 demands that user authentication be granted based on unique credentials, and the technical guidelines explicitly state to disable or strictly control shared generic accounts.

Q4: How do we prove to the auditor that we manage employee terminations securely?
A: You must provide operational evidence. The Employee Offboarding Checklist from our kit, signed by IT with timestamps showing when network access was disabled, serves as the required artifact for TPC1.4.

Q5: We use single sign-on (SSO). Is that compliant?
A: Yes, TPC1.13 allows SSO, but it must be coupled with MFA upon the initial login to the system.

Q6: What specific logs do we need to retain for access control auditing?
A: According to Appendix C of the standard, you must log failed/successful login attempts, addition/deletion of user accounts, escalation of privileges, and the activities of privileged accounts.

Q7: Can we pass the audit by just showing our IT configurations?
A: No. Auditors require both technical configurations and approved governance documentation. You must have an approved Acceptable Use Policy and Cybersecurity Policy to back up your IT infrastructure.

Eliminate Guesswork and Get Auditor-Ready IT Templates

Stop wasting your department’s valuable technical hours drafting policies from scratch. Equip your IT team with the precise documentation an auditor wants to see.

FeatureIT Manager Benefit
Technical Implementation ChecklistTranslates confusing standard jargon into actionable IT configurations (GPOs, AD rules, MFA).
Pre-Mapped Forms & ReportsReady-to-use templates like the Access Review Report (TPC1.15) to prove operational compliance instantly.
Instant Digital DownloadDeploy 17 customizable .DOCX and .XLSX files across your network today.

Secure your environment and fast-track your audit preparation.

Get the complete SACS-210 Compliance Kit (Feb 2026 Standard) via Instant Digital Download for a one-time cost of SAR 1,999 (VAT Included).

Share this article:
Fast-Track Your Compliance

Need help with Aramco CCC Certification?

Get a Free Expert Consultation.

Aramco Kit

Ali Aljubaily

Cybersecurity Consultant

I am Ali Yousef, a certified engineer from Microsoft, holding the Microsoft Certified System Associate certification as well as the CompTIA Network+ certification. I work as the Group IT Manager.

Latest

Explore Our Blog Posts

Discover insightful articles on cybersecurity and more.

Aramco Cybersecurity Compliance 20 Views 10 min read

Pass SACS-210 Compliance Using Microsoft Entra ID Plan 1: A Guide for Saudi SMEs

Pass SACS-210 compliance with Microsoft Entra ID Plan 1. A step-by-step identity and access management guide for Saudi SMEs seeking...
Read more
Aramco CCC Certification Guide for Saudi SMEs 2026 SACS-210 (Feb 2026)
Aramco Cybersecurity Compliance 94 Views 11 min read

[Updated] Aramco CCC Certification Guide for Saudi SMEs 2026

Complete guide to Saudi Aramco CCC certification under the new SACS-210 (Feb 2026) standard. Learn the 33 controls, and get...
Read more
SACS-210 Compliance Kit (Feb 2026) | Aramco CCC
Aramco Cybersecurity Compliance 51 Views 8 min read

SACS-210 Compliance Kit: Your Complete Guide to Saudi Aramco Cybersecurity Certification (Feb 2026 Standard)

Fast-track your Saudi Aramco CCC audit with our SACS-210 documentation suite. Covers TPC1.1-TPC1.33 General Requirements. Instant download to start today.
Read more

Our Certified Expertise and Technology Partnerships

We are certified partners with the world's leading cybersecurity vendors to deliver best-in-class solutions.

Microsoft
Microsoft
Certified Partner
Bitdefender
Bitdefender
Gold Partner
Fortinet
Fortinet
Authorized Partner
Acronis
Acronis
Certified Partner

Ready to Secure Your Business?

Our cybersecurity experts are here to help you achieve compliance and protect your digital assets with our 100% remote implementation model. Achieving compliance requires zero on-site field visits or internal IT hours. Contact us for a free, no-obligation assessment of your cybersecurity needs. We are committed to a 2-hour response time for all inquiries during business hours.

2-hour response time
Free consultation
Certified experts