External access

Vendor Access Review

External access grows quietly. Agencies, contractors, software tools, billing services, and temporary collaborators can keep more reach than a small team realizes.

Inventory

List where vendors can touch money, data, content, or identity.

Start with practical categories: shared inboxes, payment systems, analytics, cloud storage, CMS accounts, ad platforms, code repositories, social channels, and automation tools. The review becomes manageable when you look at concrete systems instead of “all vendor access.”

Ownership

Every external access path should have an internal owner.

Somebody on the internal team should know why the access exists, what role it supports, and when it should end. That owner does not have to manage daily work, but they should be able to approve or remove access.

Review

Check whether access is role-based or just historical.

Many access grants stay in place only because they were useful once. The goal of a review is not suspicion; it is to reduce old permissions, shared credentials, and unnecessary admin privileges.

Cadence

Run smaller reviews on a schedule instead of rare giant audits.

A quarterly pass across high-value systems is often enough for a small operation. The review works best when it is light, repeatable, and tied to role changes, vendor changes, and offboarding events.

Related guide

Small Team Security Baseline

The broader baseline page explains how vendor reviews connect to backups, admin separation, and offboarding.

Open the baseline

Related guide

Remote Work Baseline

Distributed teams often blur internal and external access. The remote work guide helps clarify that structure.

Read the remote work guide