Skip to content

5.5 Access control matrix + audit trails

Security in a manufacturing environment requires vigilance to prevent both external threats and internal, accidental data corruption (such as an operator unintentionally modifying a Master Routing). The principle of Least Privilege provides a strong defense. A user should be granted exactly enough access to perform their specific job function, and no more.

The RBAC standard (role-based access control)

Section titled “The RBAC standard (role-based access control)”

It is highly recommended to assign permissions to Roles rather than to individuals. When a team member changes jobs, you update their Role, leaving individual settings manageable and auditable.

  1. Operator:
    • Scope: The Station HMI.
    • Rights: Log in, Start/Stop Cycle, Acknowledge Alarm.
    • Block: No access to the Windows Desktop, Network Settings, or Recipe Parameters.
  2. Line Lead / Maintenance:
    • Scope: The Line.
    • Rights: Override Interlocks (with a logged code), Adjust Mechanical Offsets, Clear Jams.
    • Block: Cannot change Master Data (BOM or Route).
  3. Process Engineer:
    • Scope: The Process.
    • Rights: Edit Recipes (in Draft mode), Analyze Data, Change Cycle Times.
    • Block: Cannot “Release” their own changes (this requires a Quality signature).
  4. Quality Manager:
    • Scope: Compliance.
    • Rights: Approve/Reject Recipes, Release Master Data, Disposition Non-Conformances (e.g. Scrap).
    • Block: Cannot Edit Machine Parameters.
  5. IT Admin:
    • Scope: Infrastructure.
    • Rights: Manage Users, Execute Backups, Apply Patches.
    • Block: Avoid granting IT Admins “Super User” access to Business Data. An IT Admin should not have the system capability to “Pass” a failed unit.
  6. Auditor:
    • Scope: Oversight.
    • Rights: Global Read-Only access.
    • Block: Zero Write access.
ActionOperatorMaint / LeadEngineerQualityIT Admin
Execute Order
Edit Recipe✅ (Draft)
Approve Recipe
Bypass Interlock✅ (Log)✅ (Log)
Scrap Unit
User Mgmt
View Reports✅ (Own)

User access tends to accumulate unneeded permissions over time. “Privilege Creep” occurs when a user moves departments and retains their old access rights while acquiring new ones. A strict lifecycle must be enforced to mitigate this.

  • Trigger: HR System or Helpdesk Ticket.
  • Rule: An established Profile must be copied. (e.g. “Mirror permissions of a standard Operator”).
  • Validation: The relevant Manager must approve the specific Role request.
  • SLA: Ensure access is ready on Day 1.
  • Trigger: Promotion or Department Transfer.
  • Risk: Accumulation of conflicting rights (e.g. an Operator becomes an Engineer but retains the ability to execute production operations).
  • Logic:
    • Step 1: Revoke ALL current permissions.
    • Step 2: Apply the NEW Role permissions entirely.
    • Pro-Tip: Avoid simply “Adding” the new role on top of the old one.
  • Trigger: HR Notification.
  • Action: An Immediate Account Disable must be executed (both in Active Directory & MES).
  • Speed: Complete within < 1 Hour from the termination notice.
  • Clean Up: Ownership of any “Checked Out” files or records must be transferred to the responsible Manager.

Every click that alters data must be recorded. If the system cannot reliably reconstruct who changed a setting and when, it may not be fully compliant.

For every INSERT, UPDATE, or DELETE operation, the system should log:

  1. Who: The specific User ID (avoid generic “Admin” accounts).
  2. When: A UTC Timestamp.
  3. What: The specific Field that was changed.
  4. Value: Both the Old Value and the New Value.

Pro-Tip: Audit logs must be Read-Only. Even the IT Admin should not have permissions to delete the Audit Log. Ship these logs to an immutable SIEM (Security Information and Event Management) system or WORM storage.

Verification must follow trust; permissions drift naturally over time.

  • Frequency: Quarterly (Every 90 Days).
  • Process:
    1. IT generates a report of all Active Users and their assigned Roles.
    2. Department Managers receive the list relevant to their team.
    3. Action: The Manager must actively mark each user as “Retain” or “Revoke.”
    4. Logic: When a Manager fails to review the list by the Deadline, the system should ideally Auto-Disable the unverified accounts to enforce compliance.

Final Checkout: Access control matrix + audit trails

Section titled “Final Checkout: Access control matrix + audit trails”
CategoryMetric / ControlThreshold / Rule
Least PrivilegeRole UsageEnsure 100% of users are assigned to a Role. 0 Direct Permissions.
SegregationSoD (Segregation of Duties)Configure the system so no single user can both Edit and Approve a Master Record.
LeaversKill SwitchEnsure Terminated users are disabled in < 2 Hours.
HygieneStale AccountsWhen an account is Inactive > 30 Days, it should Auto-Disable.
AuditTraceabilityLogs must capture Old_Value vs New_Value for all Config changes.
ReviewGovernanceEnsure a Quarterly Access Review is completed by Dept Managers.
AdminControlIT Admins should be blocked from modifying Business Data (Recipes/BOMs).