Access Control & Authorization
Access Granting Process
Supershot maintains a formal access granting process to ensure security and proper authorization:
- Centralized Approval: All access privileges are reviewed and approved by the Chief Technology Officer (CTO)
- Ticketing System: Access requests are submitted through our internal ticketing system, creating an auditable trail
- Least Privilege Principle: Users are granted the minimum permissions necessary to perform their job functions
- Management Review: All access grants require management approval before implementation
- Regular Review: Access privileges are reviewed to ensure they remain appropriate for each user's role
Account Inventory
We maintain a comprehensive inventory of all user accounts:
- Centralized Database: All user accounts tracked in an internal database system
- High-Risk Vendor Tracking: Accounts on high-risk vendor platforms are included
- Essential Account Details: Includes account owners, access privileges, roles, and vendor relationships
- Dynamic Updates: Updated with access requests and changes for accuracy
- CTO Oversight: Direct oversight ensures completeness and accuracy
Regular Access Reviews
Access reviews ensure permissions remain appropriate:
- Event-Triggered Reviews: Conducted whenever employees experience role changes
- CTO-Led Process: Chief Technology Officer oversees all access reviews
- Structured Removal: Ticket-based workflow ensures systematic deactivation
- AI-Assisted: AI-based assistants help identify access anomalies
- Proactive Management: Prevents unauthorized access retention as roles evolve
Multi-Factor Authentication
MFA protects privileged access to our systems:
- Admin-Level Protection: Required for all administrator accounts across all systems
- Authenticator App Support: Industry-standard TOTP authenticator applications
- Comprehensive Coverage: Enforced for both application and infrastructure administration
- API Key Exceptions: Automated systems use securely managed API keys
- Defense in Depth: Multiple authentication factors significantly reduce unauthorized access risk
Password Management
Strict password requirements through Django's validation system:
- User Attribute Similarity Validation: Passwords cannot be too similar to user information
- Minimum Length Requirements: Enforced minimum password length standards
- Common Password Validation: Prevents use of commonly-used passwords
- Numeric Password Validation: Ensures passwords aren't entirely numeric
- Technical Enforcement: Automatically enforced at the application level for all accounts