Lock Down Access
Most hotel cyber claims start with access problems: shared logins, missing MFA, stale vendor accounts, or a staff member with permissions they never needed. “Lock Down Access” removes those weak points while keeping operations fast — and it produces proof you can hand to underwriting and audits.
Why access control is the highest-leverage fix
Training reduces clicks. Access control prevents damage when clicks happen. Insurers care because identity failures are repeat offenders: compromised email leads to invoice fraud, vendor accounts lead to ransomware paths, shared logins kill accountability.
- Shared logins during shifts
- MFA “optional” or inconsistent
- Vendors left active after projects
- Generic admin accounts
- Email takeovers and payment fraud
- PMS profile exports
- POS disruption
- Operational downtime
- MFA enforced
- Role-based access
- Access reviews
- Documented offboarding
What we lock down (control set)
We standardize identity, permissions, and vendor access so staff can work fast without being able to create a breach.
- MFA required for staff and admin accounts
- Conditional rules for high-risk logins
- Exception handling (owned + dated)
- Rollout plan that doesn’t break shifts
- MFA status report
- Policy export
- Exception list
- Remediation timeline
- Front desk / manager / night audit role separation
- Admin roles limited to named owners
- Vendor roles separated from staff roles
- Approval rules for high-impact actions
- Role summaries
- Access roster
- Admin account inventory
- Change log
- Unique accounts per staff member where possible
- Shift-safe access patterns (no downtime)
- Credential handling rules for exceptions
- Monitoring for repeated failed logins
- Shared account reduction record
- Login policy summary
- Account inventory
- Incident-ready audit trail
- Vendor roster + ownership
- Remote access windows and approved tools
- Access reviews (insurer cadence)
- Offboarding playbook + record
- Vendor access roster
- Offboarding log
- Remote access policy
- Review sign-offs
Deliverables (audit + insurance ready)
Clean outputs that answer underwriting questions fast.
- MFA enforcement report
- Password + login policy export
- Exception register
- Admin account inventory
- Role summaries
- Access roster by system
- Access review log
- Change records
- Vendor access roster
- Remote access policy
- Offboarding log
- Review sign-offs