CIS Safeguard 6.7: Centralize Access Control

CIS Safeguard 6.7: Centralize Access Control

By Steve Gold
Posted in Security
On September 30, 2025

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation

Why Every Organization Needs an Inventory of Authentication and Authorization Systems

Identity is the new perimeter. As organizations adopt cloud services, remote work, and third-party integrations, the number of systems that manage authentication and authorization has grown, often without centralized oversight. That’s where CIS Safeguard 6.6 comes in.

What is CIS Safeguard 6.6?

CIS Safeguard 6.6, part of the CIS Critical Security Controls v8, requires organizations to:

“Establish and maintain an inventory of authentication and authorization systems.”

This means identifying and documenting all systems that verify user identities (authentication) and control access to resources (authorization), across all environments (cloud, on-premises, and hybrid).

Why It Matters

Authentication and authorization systems are the gatekeepers of your digital infrastructure. If you don’t know where they are, who manages them, or how they’re configured, you’re at risk of:

  • Access sprawl: Redundant or outdated systems granting unnecessary privileges
  • Shadow IT: Unapproved tools with their own access controls
  • Audit failures: Inability to demonstrate control over identity systems
  • Security gaps: Forgotten systems that can be exploited by attackers

A complete inventory is foundational to zero trust, identity governance, and incident response.

What Should Be Included?

Your inventory should cover:

  • Identity providers (e.g., Azure AD, Okta, Google Workspace)
  • LDAP directories and RADIUS servers
  • Privileged Access Management (PAM) systems
  • VPNs and remote access tools
  • Custom-built or embedded authentication modules
  • Third-party SaaS platforms with their own access controls

Each entry should include metadata such as system owner, purpose, integration points, and user base.

How to Build and Maintain the Inventory

  • Discover: Use automated tools to scan for identity and access systems across your environment.
  • Document: Create a centralized, accessible inventory with consistent naming and tagging
  • Classify: Group systems by criticality, compliance requirements, and user roles
  • Review Regularly: Integrate inventory checks into change management and audit cycles
  • Decommission Responsibly: Ensure systems are removed from the inventory when retired or replaced

Benefits of a Well-Maintained Inventory

  • Improved visibility into your identity and access landscape
  • Faster incident response when access-related issues arise
  • Stronger compliance posture for audits and regulatory reviews
  • Better alignment with Zero Trust and identity-first security models

Final Thoughts

Authentication and authorization systems are not just technical components — they are strategic assets. Without a clear inventory, organizations risk losing control over who has access to what, and why. CIS Safeguard 6.6 ensures that your identity infrastructure is visible, accountable, and secure.

Resources

Here’s a link to the Account and Credential Management Policy Template for CIS Controls 5 and 6  provided free of charge from the fine folks at the Center for Internet Security:

Looking for even more detail? Here you go. If this still doesn’t satisfy your curiosity, DM me.

CIS Control 6 – Access Control Management

Use processes and tools to create, assign, manage, and revoke access credentials and privileges for user, administrator, and service accounts for enterprise assets and software.

CIS Safeguard 6.6 – Centralize Access Control

Centralize access control for all enterprise assets through a directory service or SSO provider, where supported.

Steve Gold

Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.