Skip to content
GitHubLinkedIn

Access Control Policy

This policy defines how access to LEF systems and data is granted, reviewed, and revoked.

OwnerInformation Security Officer
Contactinfra@lef.tec.br
Version1.1
Last updated2025-03-26
Review cadenceAnnual (or after major changes)

Define the principles, roles, and procedures that govern access to LEF’s information systems and data, ensuring that access is limited to authorized individuals based on business needs and risk.

This policy applies to all LEF employees, contractors, and third parties who access LEF systems, networks, and cloud services.

  • Access is granted on a need-to-know and least privilege basis.
  • All access must be individualized and authenticated.
  • Elevated access (e.g., administrative privileges) is strictly controlled.
  • All access to LEF internal systems is performed through a personal VPN connection, protected by Multi-Factor Authentication (MFA).
  • VPN credentials are unique, time-bound, and reviewed regularly.
  • VPN access is disabled on a project basis or in the event of dismissal, after concluding offboarding procedures.
  • OIDC (OpenID Connect) is the default authentication method and is used wherever supported.
  • Document storage and collaboration are handled through Microsoft Teams and Microsoft 365 services (OneDrive, SharePoint).
  • Some documents are hosted in LEF’s private cloud and made available per project.
  • Permissions are granted per project or functional role.
  • Confidential files are only accessible by authorized team members and protected by Microsoft 365 or private cloud security settings.
  • User accounts are created and assigned upon onboarding, based on project or departmental needs.
  • Shared accounts are prohibited.
  • Periodic access reviews are conducted by the Information Security Officer.
  • Access is removed immediately when no longer needed.
  • Access rights are reviewed at least quarterly to ensure ongoing alignment with user roles.
  • Any anomaly or policy breach results in access suspension pending review.
  • Information Security Officer: Oversees policy enforcement, access reviews, and security monitoring.
  • Managers: Ensure access is requested and justified for team members.
  • Employees and Contractors: Use credentials responsibly and report any security issues immediately.

This policy is reviewed annually or after any significant system, staffing, or compliance change.

  • Access requests and approvals:
  • Periodic access reviews:
  • Access revocation/offboarding confirmations:

If an exception is required, document the rationale and track the decision as a risk treatment/acceptance item.