Get a Pentest and security assessment of your IT network.

Cyber Security

IT Head Access Control: Email & Backups

TL;DR

It’s not reasonable for a Head of IT to have *no* access to email or backup management systems. Complete exclusion creates risks and hinders effective cyber security and disaster recovery. Access should be limited based on the ‘least privilege’ principle, using strong authentication and monitoring.

Solution Guide: Controlling Access for the Head of IT

  1. Understand the Risk
    • Blocking access entirely means they can’t investigate incidents, verify backups are working, or respond to data requests.
    • It creates a single point of failure – relying on others for critical tasks.
    • Lack of visibility hinders proactive cyber security measures.
  2. Implement the Principle of Least Privilege
  3. Don’t give full admin access. Instead, grant only what’s needed to perform their duties.

    • Email: Grant read-only access to audit logs and reporting features. Avoid giving them the ability to send emails as other users or modify mailbox settings directly.
    • Backup Management: Allow access to monitor backup jobs, restore data (with appropriate approvals – see step 4), and view reports on backup success/failure. Avoid granting permissions to delete backups or change retention policies without a second factor of approval.
  4. Technical Implementation – Email Access Control (Example: Microsoft 365)
  5. Use Role-Based Access Control (RBAC). For read-only audit access:

    # PowerShell example (requires the Exchange Online module)
    Get-Mailbox | Where {$_.Name -eq "[email protected]"} | Add-MailboxPermission -User 'AuditLogReaderRole' -AccessRights AuditAccess
    

    Create a dedicated audit log reader role with limited permissions.

  6. Technical Implementation – Backup Access Control (Example: Veeam)
  7. Veeam uses roles to control access. Create a custom role for the Head of IT:

    • Allow ‘View’ permissions on backups, repositories and jobs.
    • Allow ‘Restore’ permissions but require two-factor authentication (2FA) or approval workflows before any restore operation can complete. Configure alerts for all restores initiated by this user.
  8. Implement Multi-Factor Authentication (MFA)
  9. Crucially, always enforce MFA on accounts with access to sensitive systems like email and backup servers.

  10. Centralised Logging & Monitoring
  11. Log all actions performed by the Head of IT within these systems. Use a Security Information and Event Management (SIEM) system to monitor for unusual activity.

    • Monitor login times, data access patterns, and restore requests.
    • Set up alerts for failed login attempts or unexpected changes.
  12. Regular Access Reviews
  13. At least quarterly, review the Head of IT’s permissions to ensure they remain appropriate.

  14. Approval Workflows (Backup Restores)
  15. For backup restores, implement a workflow requiring approval from another senior member of staff before any data is restored. This adds an extra layer of security and accountability.

  16. Documentation & Training
  17. Document all access controls and procedures. Provide training to the Head of IT on their responsibilities and limitations.

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation