The organisation should establish, implement, and maintain a controlled process for granting temporary network access to service providers as a cybersecurity protection measure. Service provider connections should only be permitted following a documented authorisation request approved by an authorised owner and shall be limited to a predefined and justified time period (for example, the duration of a maintenance operation).
Temporary access should be technically time-bound and automatically disabled upon expiry of the approved period. The organisation should review and, where appropriate, update the process and supporting controls at planned intervals and following significant incidents or significant changes to operations or cyber risk.