When an employee leaves your organization, how long does it take to revoke their access to every system that touches Aramco data? If the answer is "we would need to check each system individually" or "it depends on who remembers to do it," your organization has a TPC-6 compliance gap that auditors will find. Identity and access lifecycle management is one of the most operationally challenging SACS-002 controls because it requires coordination across every system, every time someone joins, changes roles, or leaves. This guide explains exactly what TPC-6 and TPC-18 require and how to implement centralized access lifecycle management.

The SACS-002 Access Lifecycle Controls

Two TPC controls form the core of SACS-002's access lifecycle requirements. Together, they ensure that only authorized individuals have access to systems containing Aramco data, and that access is promptly removed when no longer needed.

TPC-6: Third Party must notify Saudi Aramco within 24 hours when any employee with Saudi Aramco credentials is terminated or no longer requires access. All access must be revoked within 24 hours of separation.

TPC-18: Third Party must implement formal off-boarding procedures that include return of all Saudi Aramco assets, deactivation of all credentials, removal of access to all systems, and documented evidence of completion.

Why These Controls Matter

Former employees with active credentials represent one of the highest-risk attack vectors in supply chain security. A terminated employee who retains VPN access, email access, or file storage access can exfiltrate Aramco data days or weeks after leaving. The 24-hour requirement in TPC-6 exists precisely because Aramco has seen real incidents where former contractor employees accessed systems long after their engagement ended.

The Access Lifecycle: Joiner, Mover, Leaver

Identity and access management follows a three-phase lifecycle. Each phase has specific SACS-002 implications.

Joiner (New Employee Onboarding)

When a new employee is hired who will work on Aramco-related projects, they need access to specific systems. The principle of least privilege applies -- they should receive only the minimum access necessary for their role, not blanket admin access to everything.

Compliant onboarding includes:

Mover (Role Change)

When an employee changes roles within the organization, their access requirements change. A common audit finding is "access creep" -- employees accumulate access from previous roles without having old permissions revoked. An engineer who moves to a project management role should lose their server admin access but retain document access.

Compliant role changes include:

Leaver (Termination or Contract End)

This is where TPC-6 and TPC-18 apply directly. When an employee leaves -- whether through resignation, termination, or contract completion -- all access must be revoked within 24 hours.

Compliant off-boarding includes:

TPC-6 and TPC-18 Audit Evidence

Evidence Item What Auditors Expect
Off-boarding procedure Written procedure document listing each step: access revocation, asset return, notification, documentation
Recent off-boarding records Completed checklists for employees who left in the last 12 months, showing timestamps for each step
24-hour compliance proof Timestamps showing access was revoked within 24 hours of separation date (compare HR termination date to system access revocation date)
Aramco notification records Email or ticket records showing 24-hour notification to Aramco for employees with Aramco credentials
Access review reports Most recent quarterly access review showing all current users and their access levels
No orphaned accounts Cross-reference of active system accounts against current employee list -- no accounts for former employees

Quarterly Access Reviews

Beyond the joiner/mover/leaver lifecycle, SACS-002 expects periodic reviews of who has access to what. Access reviews catch dormant accounts, excessive permissions, and unauthorized access that may have been granted outside normal processes.

A compliant access review process includes:

Privileged Access Management (PAM)

Privileged accounts (admin, root, superuser) pose the highest risk because they have unrestricted access to systems and data. SACS-002's access control requirements apply with extra force to these accounts.

PAM Best Practices for CCC

Service Account Management

Service accounts -- non-human accounts used by applications and automated processes -- are often overlooked in access reviews. Yet they frequently have elevated privileges and rarely have their passwords rotated. SACS-002 auditors will check for:

Common IAM Audit Failures

  1. Orphaned accounts: Active system accounts belonging to employees who left months ago. This is the most damaging finding because it demonstrates a fundamental breakdown in access lifecycle management.
  2. No formal off-boarding procedure: When asked for the off-boarding checklist, the vendor cannot produce one. Access revocation happens informally (or not at all) when someone happens to remember.
  3. 24-hour violation: The auditor compares HR termination dates to system access revocation dates and finds accounts that remained active for days or weeks after the employee left.
  4. Access creep: Employees who changed roles retain access from their previous position. A quarterly access review would have caught this, but no reviews were conducted.
  5. Shared accounts: Multiple employees share a single login. This makes it impossible to track who did what and violates individual accountability requirements.
  6. No access review evidence: The vendor claims to review access regularly but cannot produce any documentation showing when reviews occurred or what was found.
  7. Privileged accounts without MFA: Admin accounts that can be accessed with just a password, without multi-factor authentication.
  8. Unmonitored service accounts: Service accounts with admin privileges that have not had their passwords changed since creation and have no activity monitoring.

How MassiveGRID's IAM Lifecycle Component Works

Managing access lifecycle across multiple disconnected systems -- email, file hosting, VPN, RDP, firewall rules, monitoring dashboards -- is operationally difficult. When an employee leaves, someone must remember to revoke access in each system individually. Miss one system, and you have an orphaned account that the auditor will find.

MassiveGRID's Identity and Access Lifecycle component, included in the CCC-Compliant Infrastructure Package, centralizes this into a single platform:

Integration with Other SACS-002 Controls

IAM lifecycle management connects directly to several other SACS-002 controls:

Key insight: IAM is the connecting tissue between most other SACS-002 controls. Without centralized identity management, each control operates in isolation -- password policies in one system, MFA in another, training records in a spreadsheet. The IAM component ties them together into a coherent compliance posture.

Get IAM as Part of the Full CCC Package

Identity and access lifecycle management is one of ten components in the MassiveGRID Aramco CCC-Compliant Infrastructure Package. Together with email hosting, encrypted file hosting, firewall, VPN, monitoring, security training, patch management, and backup/DR, it provides everything you need to satisfy the infrastructure and operational controls of SACS-002.

Explore the full CCC-compliant infrastructure package →