AiVRIC User Guide
Security policy

Identification & Authorization Control

Covers identity proofing, authentication, and authorization for AiVRIC systems.

Applies to AiVRIC workforce, partners, and subprocessors Trust Center Acceptable use

Purpose & scope

This policy guides how AiVRIC designs, operates, and validates Identification & Authorization Control across production, corporate, and partner environments.

It applies to employees, contractors, vendors, and any system interacting with AiVRIC data or services.

Key controls

  • Use SSO with MFA for workforce access; enforce device trust where applicable.
  • Apply least privilege with role-based access and periodic reviews.
  • Disallow shared accounts; service accounts must be scoped and rotated.
  • Log all authentication/authorization events and monitor anomalies.

Operating procedures

  • Review access rights quarterly for production and customer-impacting systems.
  • Rotate service credentials per policy or after ownership changes.
  • Enable conditional access for risky logins when available.

Evidence & ownership

Owner: Security & Compliance. Review cadence: annually or after material changes.

Evidence: Collected via AiVRIC audit logs, ticketing systems, monitoring dashboards, and vendor records as appropriate to this policy area.

Contact: [email protected]