About the Access Control Policy Generator

Generate a clean Access Control Policy covering least privilege, role mapping, JML lifecycle, and periodic access reviews with evidence capture.
🔵 Open Tool

What this tool does

It builds a tailored Access Control Policy. You define the access model, approvals, privileged access rules, and the full joiner-mover-leaver lifecycle. It also codifies how reviews are performed, where evidence is stored, and how remediation is tracked.

Processing happens entirely in your browser. No inputs are sent to any server.

How to use it

What it covers

Helpful references

For alignment and audits, compare your selections with NIST SP 800-53 Rev. 5 (AC family), ISO/IEC 27001 & Annex A (Access Control), and CIS Critical Security Controls (Safeguard 6).