CIS Safeguard 6.6: Inventory Authentication and Authorization Systems

CIS Safeguard 6.6: Inventory Authentication and Authorization Systems

By Steve Gold
Posted in Security
On September 24, 2025

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation

Jurassic Park and the Forgotten Gatekeepers: Why You Need an Inventory of Authentication and Authorization Systems

In Jurassic Park, the park’s downfall wasn’t just the dinosaurs, it was the lack of control over who had access to what. Dennis Nedry, the disgruntled systems engineer, had unchecked access to critical systems. When he disabled security to steal embryos, no one knew how to stop him because no one had a clear inventory of the systems he controlled.

That’s exactly the kind of chaos CIS Safeguard 6.6 is designed to prevent.

What is CIS Safeguard 6.6?

“Establish and Maintain an Inventory of Authentication and Authorization Systems.”

This safeguard ensures that organizations know exactly which systems are responsible for verifying identities and granting access , and that this inventory is kept up to date.

Why It Matters

In Jurassic Park, the park’s leadership didn’t know which systems Nedry had access to — or how to override them. In your organization, a similar lack of visibility can lead to:

  1. Orphaned access points that attackers can exploit
  2. Inconsistent policies across cloud and on-prem systems
  3. Audit failures due to undocumented systems
  4. Privilege creep where users retain access they no longer need

Real-World Parallels

  1. A global enterprise suffered a breach when attackers exploited a forgotten legacy VPN server with outdated authentication.
  2. A financial institution failed a regulatory audit because it couldn’t produce a complete list of systems managing user access.

How to Implement CIS 6.6

  1. Discover: Use tools to scan for identity and access management (IAM) systems, including cloud-native and legacy platforms.
  2. Document: Maintain a centralized, living inventory that includes:
    1. System name and function
    2. Owner and administrator
    3. Integration points
    4. Authentication methods (e.g., SSO, MFA)
  3. Review Regularly: Tie inventory updates to change management and access reviews.
  4. Decommission Securely: Ensure systems are removed from the inventory when retired — and that access is revoked.

Pro Tip

Integrate this inventory with your Identity Governance and Administration (IGA) platform. This allows you to automate access reviews, detect anomalies, and enforce least privilege.

Final Thought

In Jurassic Park, the dinosaurs weren’t the only threat — it was the invisible systems no one was tracking. Don’t let your organization fall into the same trap.

CIS Safeguard 6.6 is your blueprint for visibility, control, and resilience in a world where access is everything.

Resources

Here’s a link to the Account and Credential Management Policy Template for CIS Controls 5 and 6  provided free of charge from the fine folks at the Center for Internet Security:

Looking for even more detail? Here you go. If this still doesn’t satisfy your curiosity, DM me.

CIS Control 6 – Access Control Management

Use processes and tools to create, assign, manage, and revoke access credentials and privileges for user, administrator, and service accounts for enterprise assets and software.

CIS Safeguard 6.6 – Establish and Maintain an Inventory of Authentication and Authorization Systems

Establish and maintain an inventory of the enterprise’s authentication and authorization systems, including those hosted on-site or at a remote service provider. Review and update the inventory, at a minimum, annually, or more frequently.

Steve Gold

Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.