Well-Architected Framework
Define access requirements
Defining access requirements for your organization is an important step in creating secure systems. Identifying what requirements you need to implement can seem overwhelming. There are steps you can take to simplify identifying the requirements you need and collecting the necessary documentation to implement the access requirements.
What are access requirements
Every system you interact with today includes a set of access requirements. These requirements define who can access the system, what actions they can take, and under what conditions they can access the system. Access requirements come from several sources, including:
Industry regulations that define role-based access controls or separation of duties requirements (PCI, HIPAA).
Local, federal, or international regulatory standards that define data privacy and protection (CCPA, Sarbanes-Oxley, GDPR).
Current best operational practices that define security controls (SOC 2, NIST, ISO 27001).
When you understand which regulations and standards apply to your organization, you can begin to identify the specific access requirements that you need to implement for your systems and teams.
How to define access requirements
Start by identifying the regulations and standards that apply to your organization from both an industry and geographic perspective. These regulations often align with specific security practices, such as NIST SP 800-53 for access control.
Once you have identified and collected the requirements that apply to your organization, you need to document those requirements and begin mapping the specific access controls to your systems and teams. Documenting these requirements helps you ensure that you are meeting the necessary regulations and standards.
You should also designate a group responsible for staying up-to-date on changes to regulations and standards that may affect your access requirements. When regulations, standards, or best practices change, you need to update your access requirements accordingly. The group responsible for staying up-to-date on regulation updates evangelizes the need for strong security practices across your organization.
Documenting and maintaining your access requirements helps you ensure that you can meet audit requirements, such as those for SOC 2 or ISO 27001. Auditors will want to see that you have a clear understanding of your access requirements and that you are implementing the necessary controls to meet those requirements.
As you begin defining your access requirements, also think about how you can manage these controls at scale. HashiCorp's Terraform helps you deploy policies as code such as policies for Vault or Sentinel to manage access controls across your systems.
Project infragraph, announced at HashiConf 2025, is a real-time infrastructure graph that provides visibility into your infrastructure and its relationships. By understanding relationships between your resources, you can better define and manage access requirements.
You can apply to our private beta for project infragraph here.
HashiCorp resources:
- Access controls with Vault policies
- Policy as code with Sentinel
- Create IAM policies with Terraform
- Use templates with Waypoint
External resources:
- NIST cybersecurity framework
- Define, update, share, and enforce policies using code
- Understanding separation of duties
Next steps
Following these documents in order ensures a logical progression through the key concepts and best practices, helping you build a strong foundation to build your identity and access management program.
- Define access requirements (this document)
- Grant least privilege
- Create permissions and guardrails
- Centralize identity management
- Implement strong sign-in workflows
- Use dynamic credentials
- Manage access lifecycle
In this section of Identity and access management, you learned the importance of identifying and collecting access requirements from common sources such as industry and regulatory standards. Identity and access management is part of the Secure systems pillar.