This document is under active development and has not been finalized.
Skip to content

Authorization & Permission Management

Access Control Model

BAUER GROUP employs a role-based access control (RBAC) model:

PrincipleImplementation
Least PrivilegeEvery account receives only the minimum necessary permissions
Need-to-KnowData access only on business necessity
Separation of DutiesCritical operations require multiple persons
Default DenyNo access without explicit authorization

Role Definitions

RolePermissionsGranted by
UserAccess to assigned applications and dataSupervisor + IT
DeveloperCode repositories, staging environments, CI/CDTeam lead + IT
AdministratorSystem configuration, user management, monitoringISO + IT Lead
Root / SuperadminFull access to infrastructureIT Lead only, four-eyes principle

Permission Lifecycle

Grant

  1. Request by employee or supervisor
  2. Approval by responsible data/system owner
  3. Implementation by IT
  4. Documentation in the permission inventory

Change

  1. On role change: revoke old permissions, grant new permissions
  2. Deadline: within 5 business days of role change
  3. Review of old permissions by supervisor

Revocation (Offboarding)

StepDeadlineResponsible
Account deactivationOn last working day, before end of workIT
Email forwardingSet up to delegate (time-limited)IT
Shared credentialsRotation of all shared access credentialsIT + Department
Hardware returnOn last working daySupervisor
VPN / remote accessImmediate deactivationIT

Authorization Audit

ReviewIntervalAction
Full permission reviewSemi-annuallyEach system owner reviews permissions for their systems
Orphaned accountsMonthly (automated)Deactivation of accounts without a corresponding active employee
Privileged accountsQuarterlyReview of all admin permissions for necessity
Service accountsSemi-annuallyOwner confirms necessity and scope

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT