Access Control Policy
Purpose
To ensure that access controls are implemented and in compliance with IT security policies, standards, and procedures.
Reference
National Institute of Standards and Technology (NIST) Special Publications (SP): NIST SP 800-53a
- Access Control (AC), NIST SP800-12, NIST 800-46, NIST SP 800-48, NIST SP 800-77, NIST SP 800-94, NIST SP 800-97, NIST SP 800-100, NIST SP 800-113, NIST SP 800-114, NIST SP 800-121, NIST SP 800-124, NIST SP 800-164;
NIST Federal Information Processing Standards (FIPS) 199
Policy
This policy is applicable to all departments and users of [entity] resources and assets.
ACCOUNT MANAGEMENT
IT Department shall:
- Identify and select the following types of information system accounts to support organizational missions and business functions: individual, shared, group, system, guest/anonymous, emergency, developer/manufacturer/vendor, temporary, and service.
- Assign account managers for information system accounts.
- Establish conditions for group and role membership.
- Specify authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account.
- Require approvals by system owners for requests to create information system accounts.
- Create, enable, modify, disable, and remove information system accounts in accordance with approved procedures.
- Monitor the use of information system accounts.
- Notify account managers when accounts are no longer required, when users are terminated or transferred, and when individual information system usage or need-to-know changes.
- Authorize access to the information system based on a valid access authorization or intended system usage.
- Review accounts for compliance with account management requirements [entity defined frequency].
- Establish a process for reissuing shared/group account credentials (if deployed) when individuals are removed from the group.
- Employ automated mechanisms to support the management of information system accounts.
- Ensure that the information system automatically disables temporary and emergency accounts after usage.
- Ensure that the information system automatically disables inactive accounts after [entity defined frequency]
- Ensure that the information system automatically audits account creation, modification, enabling, disabling, and removal actions, and notifies appropriate IT personnel.
ACCESS ENFORCEMENT
IT Department shall:
- Ensure that the information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
INFORMATION FLOW ENFORCEMENT
IT Department shall:
- Ensure that the information system enforces approved authorizations for controlling the flow of information within the system and between interconnected systems based on applicable policy.
SEPARATION OF DUTIES
IT Department shall:
- Separate duties of individuals as necessary, to prevent malevolent activity without collusion.
- Document the separation of duties of individuals.
- Define information system access authorizations to support separation of duties.
LEAST PRIVILEGE
IT Department shall:
- Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions.
- Authorize explicitly access to hardware and software controlling access to systems and filtering rules for routers/firewalls, cryptographic key management information, configuration parameters for security services, and access control lists.
- Require that users of information system accounts, or roles, with access to [entity defined security functions or security-relevant information], use non-privileged accounts or roles, when accessing non-security functions.
- Restrict privileged accounts on the information system to [entity defined personnel or roles].
- Ensure that the information system audits the execution of privileged functions.
- Ensure that the information system prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
UNSUCCESSFUL LOGON ATTEMPTS
IT Department shall ensure that the information system:
- Enforces a limit of consecutive invalid logon attempts by a user during a [entity defined frequency].
- Locks the account/node automatically for [entity defined frequency] or until released by an administrator when the maximum number of unsuccessful attempts is exceeded.
SYSTEM USE NOTIFICATION
IT Department shall ensure that the information system:
- Displays to users an approved system use notification message or
banner before granting access to the system that provides privacy and
security notices consistent with applicable state and federal laws,
directives, policies, regulations, standards, and guidance and states
informing that:
- Users are accessing a [entity] information system.
- Information system usage may be monitored, recorded, and subject to audit.
- Unauthorized use of the information system is prohibited and subject to criminal and civil penalties.
- Use of the information system indicates consent to monitoring and recording.
- There are not rights to privacy.
- Retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system.
- For publicly accessible systems, the IT Department shall ensure that
the information system:
- Displays system use information [entity defined conditions], before granting further access.
- Displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities.
- Includes a description of the authorized uses of the system.
- Displays to users an approved system use notification message or
banner before granting access to the system that provides privacy and
security notices consistent with applicable state and federal laws,
directives, policies, regulations, standards, and guidance and states
informing that:
SESSION LOCK
IT Department shall ensure that the information system:
- Prevent further access to the system by initiating a session lock after [entity defined frequency] of inactivity or upon receiving a request from a user.
- Retain the session lock until the user reestablishes access using established identification and authentication procedures.
- Conceal, via the session lock, information previously visible on the display with a publicly viewable image.
SESSION TERMINATION
IT Department shall:
- Ensure that the information system automatically terminates a user session after [entity defined frequency].
PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION
IT Department shall:
- Identify user actions that can be performed on the information system without identification or authentication consistent with organizational missions and business functions.
- Document and provide supporting rationale in the security plan for the information system, user actions not requiring identification or authentication.
REMOTE ACCESS
IT Department shall:
- Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed.
- Authorize remote access to the information system prior to allowing such connections.
- Ensure that the information system monitors and controls remote access methods.
- Ensure that the information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
- Ensure that the information system routes all remote accesses through [entity defined number] managed network access control points to reduce the risk for external attacks.
- Authorize the execution of privileged commands and access to security-relevant information via remote access only for [entity defined needs].
- Document the rationale for such access in the security plan for the information system.
WIRELESS ACCESS
IT Department shall:
- Establish usage restrictions, configuration/connection requirements, and implementation guidance for wireless access.
- Authorize wireless access to the information system prior to allowing such connections.
- Ensure that the information system protects wireless access to the system using authentication of users and devices and encryption.
ACCESS CONTROL FOR MOBILE DEVICES
IT Department shall:
- Establish usage restrictions, configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices.
- Authorize the connection of mobile devices to organizational information systems.
- Employ full-device encryption or container encryption to protect the confidentiality and integrity of information on approved devices.
USE OF EXTERNAL INFORMATION SYSTEMS
IT Department shall:
- Establish terms and conditions, consistent with any trust
relationships established with other organizations owning, operating,
and/or maintaining external information systems, allowing authorized
individuals to:
- Access the information system from external information systems.
- Process, store, or transmit organization-controlled information using external information systems.
- Permit authorized individuals to use an external information
system to access the information system or to process, store, or
transmit organization-controlled information only when the
organization:
- Verifies the implementation of required security controls on the external system as specified in the organization's information security policy and security plan.
- Retains approved information system connection or processing agreements with the organizational entity hosting the external information system.
- Establish terms and conditions, consistent with any trust
relationships established with other organizations owning, operating,
and/or maintaining external information systems, allowing authorized
individuals to:
INFORMATION SHARING
IT Department shall:
- Facilitate information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for [entity defined information sharing circumstances where user discretion is required].
- Employ [entity defined automated mechanisms or manual processes] to assist users in making information sharing/collaboration decisions.
PUBLICLY ACCESSIBLE CONTENT
IT Department shall:
- Designate individuals authorized to post information onto a publicly accessible information system.
- Train authorized individuals to ensure that publicly accessible information does not contain nonpublic information.
- Review the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included.
- Review the content on the publicly accessible information system for nonpublic information [entity defined frequency] and removes such information, if discovered.
Compliance
Employees who violate this policy may be subject to appropriate disciplinary action up to and including discharge as well as both civil and criminal penalties. Non-employees, including, without limitation, contractors, may be subject to termination of contractual agreements, denial of access to IT resources, and other actions as well as both civil and criminal penalties.
Policy Exceptions
Requests for exceptions to this policy shall be reviewed by the Chief Information Security Officer (CISO) and the Chief Information Officer (CIO). Departments requesting exceptions shall provide such requests to the CIO. The request should specifically state the scope of the exception along with justification for granting the exception, the potential impact or risk attendant upon granting the exception, risk mitigation measures to be undertaken by the IT Department, initiatives, actions and a time-frame for achieving the minimum compliance level with the policies set forth herein. The CIO shall review such requests; confer with the requesting department.