0% found this document useful (0 votes)
24 views

Access Control Policy1

- The document outlines ABC Inc.'s access control policy, which aims to limit access to authorized parties according to business needs. It covers the scope, requirements, and procedures for access provisioning, reviews, and removal. The policy dictates role-based access controls, multi-factor authentication for privileged access, and regular reviews to ensure least privilege access. It also addresses password policies, application access restrictions, log-on procedures, and controls over privileged programs and source code.

Uploaded by

Adaa Jarso
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Access Control Policy1

- The document outlines ABC Inc.'s access control policy, which aims to limit access to authorized parties according to business needs. It covers the scope, requirements, and procedures for access provisioning, reviews, and removal. The policy dictates role-based access controls, multi-factor authentication for privileged access, and regular reviews to ensure least privilege access. It also addresses password policies, application access restrictions, log-on procedures, and controls over privileged programs and source code.

Uploaded by

Adaa Jarso
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Access Control Policy

Version 1.0

Policy Owner: Compliance


Effective Date: Jan 31, 2022

• Purpose
To limit access to information and information processing systems, networks, and facilities to
authorized parties in accordance with business objectives.

• Scope
All ABC Inc., dba ABC (the “Company”) information systems that process, store, or transmit
confidential data as defined in the Company Data Management Policy. This policy applies to all
employees of the Company and to all external parties with access to Company engineering
networks and system resources.

• Policy
Access to information computing resources is limited to personnel with a business requirement
for such access. Access rights shall be granted or revoked in accordance with this Access Control
Policy.

• Business Requirements of Access Control


Access Control Policy
The Company shall determine the type and level of access granted to individual users based on
the “principle of least privilege.” This principle states that users are only granted the level of
access absolutely required to perform their job functions, and is dictated by the Company’s
business and security requirements. Permissions and access rights not expressly granted shall be,
by default, prohibited.
The Company’s primary method of assigning and maintaining consistent access controls and
access rights shall be through the implementation of Role-Based Access Control (RBAC).
Wherever feasible, rights and restrictions shall be allocated to groups. Individual user accounts
may be granted additional permissions as needed with approval from the system owner or
authorized party.
All privileged access to production systems should use Multi-Factor Authentication (MFA).
Access to Networks and Network Services
The following security standards shall govern access to ABC networks and network services:
• Technical access to Company networks must be formally documented
including the standard role or approver, grantor, and date
• Only authorized Company employees and third-parties working off a
signed contract or statement of work, with a business need, shall be granted access to the
Company production networks
• Company guests may be granted access to guest networks after registering
with office staff without a documented request
• Remote connections to production systems and networks must be
encrypted

• User Access Management


The Company requires that all personnel have a unique user identifier for system access, and that
user credentials and passwords are not shared between multiple personnel. For certain critical
services, as determined by the company, users with multiple levels of access should be given
separate accounts for normal system use and for administrative functions. Root, service, and
administrator accounts may use a password management system to share passwords for business
continuity purposes only. Administrators shall only use shared administrative accounts as
needed.
User Registration and Deregistration
Only authorized administrators shall be permitted to create new user IDs, and may only do so
upon receipt of a documented request from authorized parties. User provisioning requests must
include approval from data owners or Company management authorized to grant system access.
Prior to account creation, administrators should verify that the account does not violate any
Company security or system access control policies such as segregation of duties, fraud
prevention measures, or access rights restrictions.
User IDs shall be promptly disabled or removed when users leave the organization or contract
work ends. User IDs shall not be re-used.
User Access Provisioning
• New employees and/or contractors are not to be granted access to any
ABC production systems until after they have completed all HR on-boarding tasks, which
may include but is not limited to signed employment agreement, intellectual property
agreement, and information security policy
• No access to critical systems may be granted earlier than the employee
start date
• Access should be restricted to only what is necessary to perform job duties
• Records of all permission and privilege changes shall be maintained for no
less than one year
Management of Privileged Access
Granting of administrative rights shall be strictly controlled, and requires approval from the asset
owner.
User Access Reviews
Administrators shall perform access rights reviews of user, administrator, and service accounts
regularly (typically quarterly) to verify that user access is limited to systems that are required for
their job function. Access reviews shall be documented.
Access reviews may include group membership as well as evaluations of any specific or
exception-based permission. Access rights shall also be reviewed as part of any job role change,
including promotion, demotion, or transfer within the company.
Removal & Adjustment of Access Rights
The access rights of all users shall be promptly removed upon termination of their employment
or contract, or when rights are no longer needed due to a change in job function or role. The
maximum allowable time period for access termination is 24 business hours.
Access Provisioning, Deprovisioning, and Change Procedure
The Access Management Procedure for ABC systems can be found in Appendix A to this policy.

• User Responsibility for the Management


of Secret Authentication Information
Control and management of individual user passwords is the responsibility of all ABC personnel
and third-party users. Users shall protect secret authentication information in accordance with the
Information Security Policy.

• Password Policy
Where feasible, passwords for confidential systems shall be configured for at least eight (8)
characters, one upper case, one number.

• System and Application Access


Information Access Restriction
Applications must restrict access to program functions and information to authorized users and
support personnel in accordance with the defined access control policy. The level and type of
restrictions applied by each application should be based on the individual application
requirements, as identified by the data owner. The application-specific access control policy must
also conform to ABC policies regarding access controls and data management.
Prior to implementation, evaluation criteria are to be applied to application software to determine
the necessary access controls and data policies. Assessment criteria include, but are not limited
to:
• Sensitivity and classification of data.
• Risk to the organization of unauthorized access or disclosure of data
• The ability to, and granularity of, control(s) on user access rights to the
application and data stored within the application
• Restrictions on data outputs, including filtering sensitive information,
controlling output, and restricting information access to authorized personnel
• Controls over access rights between the evaluated application and other
applications and systems
• Programmatic restrictions on user access to application functions and
privileged instructions
• Logging and auditing functionality for system functions and information
access
• Data retention and aging features
All unnecessary default accounts must be removed or disabled before making a system available
on the network. Specifically, vendor default passwords and credentials must be changed on all
ABC systems, devices, and infrastructure prior to deployment. This applies to ALL default
passwords, including but not limited to those used by operating systems, software that provides
security services, application and system accounts, and Simple Network Management Protocol
(SNMP) community strings where feasible.
Secure Log-on Procedures
Secure log-on controls shall be designed and selected in accordance with the sensitivity of data
and the risk of unauthorized access based on the totality of the security and access control
architecture.
Password Management System
Systems for managing passwords should be interactive and assist ABC personnel in maintaining
password standards by enforcing password strength criteria including minimum length, and
password complexity where feasible.
All storage and transmission of passwords is to be protected using appropriate cryptographic
protections, either through hashing or encryption.
Use of Privileged Utility Programs
Use of utility programs, system files, or other software that might be capable of overriding
system and application controls or altering system configurations must be restricted to the
minimum personnel required. Systems are to maintain logs of all use of system utilities or
alteration of system configurations. Extraneous system utilities or other privileged programs are
to be removed or disabled as part of the system build and configuration process.
Management approval is required prior to the installation or use of any ad hoc or third-party
system utilities.
Access to Program Source Code
Access to program source code and associated items, including designs, specifications,
verification plans, and validation plans shall be strictly controlled in order to prevent the
introduction of unauthorized functionality into software, avoid unintentional changes, and protect
ABC intellectual property.
All access to source code shall be based on business need and must be logged for review and
audit.
• Exceptions
Requests for an exception to this Policy must be submitted to the IT Manager for approval.

• Violations & Enforcement


Any known violations of this policy should be reported to the IT Manager. Violations of this
policy can result in immediate withdrawal or suspension of system and network privileges and/or
disciplinary action in accordance with company procedures up to and including termination of
employment.

Version
Date
Description
Author
Approved by
1.0
31-Jan-2022
First Version
SVP, Compliance
Chief Compliance Officer
APPENDIX A – Access Management Procedure
At the completion of the onboarding process, the new developer will be introduced to
IT/Administration to offer relevant access.
IT/ Administration will provision access for all company-wide systems as well as engineering
systems for the Members of Technical Staff (MTS) group.
Additional access, beyond standard pre-approved access, must be requested and approved by a
manager or system owner.

You might also like