Clerk.io

Access Control Policy

1. Purpose

Define requirements for granting, reviewing and revoking access to Clerk.io information assets.

2. Principles

  1. Least Privilege – users receive the minimum access necessary.
  2. Need-to-Know – data access aligns with job role.
  3. Segregation of Duties – no single person can deploy unreviewed code to prod.
  4. Timely Revocation – accounts disabled within 24 h of termination.

3. Account Types

Type Examples Approval
Workforce (SSO) Google Workspace, Slack, GitHub Line Manager + ISM
Privileged AWS IAM, DB admin CTO + ISM
Service Accounts CI/CD robots, API tokens System Owner + ISM

4. Authentication Requirements

5. Access Request & Approval

  1. Submit ticket in Jira Security queue.
  2. Manager justifies business need.
  3. ISM reviews for conflicts.
  4. Upon approval, access granted by SRE; ticket closed.

6. Reviews

7. Revocation

HR off-boarding triggers removal workflow: * Disable SSO account.
Revoke tokens, GitHub access, VPN certificates.
Collect hardware.

8. Exceptions

Temporary elevated access (sudo, AWS IAM) may be granted for max 8 h via JIT tooling; auto-expires.

9. Monitoring

Login events are forwarded to SIEM. Anomalous patterns generate Better Stack alerts.

10. Compliance

Non-compliance reported to ISM; disciplinary action possible.

Version 1.0 — effective 2025-07-01