Information Technology Policy Role-Based User Management
Information Technology Policy Role-Based User Management
1 Source: www.knowledgeleader.com
Table of Contents
INFORMATION TECHNOLOGY POLICY: ROLE-BASED USER MANAGEMENT..................................................3
ROLE-BASED USER MANAGEMENT..................................................................................................................... 6
2 Source: www.knowledgeleader.com
INFORMATION TECHNOLOGY POLICY: ROLE-BASED
USER MANAGEMENT
Prepared By:
Approved By:
Revision Date:
Effective Date:
POLICY
PURPOSE
The purpose of this policy is to ensure that there are additional controls in place, specifically to:
• Detect errors using multistep processes to limit opportunities for employee fraud or theft and increase the
probability of detection when fraud or misappropriation of assets is attempted.
• Safeguard company computers and networks against inadvertent exposure to external threats.
SCOPE
3 Source: www.knowledgeleader.com
RESPONSIBILITY
IT technical support is responsible for assessing any user’s request for additional privileges beyond the basic
defined template.
All users who need additional privileges for specific tasks are responsible for ensuring that those privileges are
active only during the execution of those specific tasks.
DEFINITIONS
• Separation of Duties: A security principle that ensures that an individual cannot breach security alone
• Least Privilege: A security principle that ensures that a user only has those privileges required for the task at
hand and no more.
PROCEDURES
A department manager who requests special system, application or data access privileges for an employee must
include detailed justifications specifying why the special privileges are required based on the roles and
responsibilities assigned to the employee.
IT technical support will review all requests for additional privileges and:
• Approve those requests that have sufficient justification.
• Reject requests that do not have sufficient justification and include the reason for the rejection. Suggestions for
workarounds will be returned if enough information is supplied with the request.
A user who needs special system privileges for specific responsibilities will be assigned a secondary user
identifier with those privileges. This user identifier must be used only for the tasks needing special privileges.
4 Source: www.knowledgeleader.com
When these tasks no longer need to be performed, the user must revert to the privileges associated with his
regular user identifier.
All application and process design checklists must include a requirement that applications and processes
involving funds or the transfer of goods must have the involvement of multiple users for the completion of the
transfer.
Applications not needing special privileges during execution must not be dependent on special privileges being
active.
5 Source: www.knowledgeleader.com
ROLE-BASED USER MANAGEMENT
THE NEED
Separation of duties is a powerful internal control. Separation of duties requires that more than one individual
initiate and conclude a transaction. It is strengthened by having clear policies setting out what users may and may
not do and requiring that more than one user be involved in certain activities.
CONTROL OBJECTIVES
DS5: Ensure systems security, maintain information R: Ensure that appropriate controls are established
and processing infrastructure integrity, and minimize over data management activities.
the impact of security vulnerabilities and incidents.
T: Ensure the integrity, confidentiality and availability
of information technology throughout the enterprise.
CONSIDERATIONS
The principles of “separation of duties” and “least privilege” are important general business controls. They are
used to ensure that any process used to transfer currency or goods or to create or modify important records of
transactions or balances cannot be executed from start to finish by one individual. Separation of duties protects
against inadvertent errors by requiring at least two individuals to be involved. It also may prevent theft or fraud
since they would require the collusion of two or more employees.
Enforcement is accomplished by identifying the roles assigned to different users and specifying restrictions by role
or by the user as to the applications and operations that different users may execute, what data they can access,
and the form of their data access, such as read-only, write-only, read and write, read and update, or update-only.
In the most commonly used example, two separate transactions are needed to complete a payment process: first,
initiate the payment transaction, and second, authorize the payment. No single employee should be capable of
acting in both roles. This example can be extended to require a second authorization for a payment exceeding a
specified threshold such as $10,000, with additional authorizations at higher thresholds. Each extension adds
controls to lower the probability of collusion further.
It is also important to maintain separation of duties when one or more of the employees involved in a process is ill,
on vacation, on leave of absence or away on business for an extended period. One or more backup people must
6 Source: www.knowledgeleader.com
be assigned for each role. These backups must not be currently assigned to the process in another role. The
objective is to preserve control without unduly interfering with business operations.
The principle of least privilege is another necessary security control. It requires that an employee be given no
more privilege than necessary to execute their responsibilities. Additionally, the employee must only activate
those privileges needed to perform any specific task. For example, a system administrator should not be
operating with administrator privileges when surfing the internet or opening an email. Accidentally accessing a
rogue website with administrator privileges could seriously compromise the system administrator’s computer and
the attached network.
To ensure that an employee has the least privilege necessary, you must identify the employee’s responsibilities,
determine the minimum set of privileges needed to execute those responsibilities, and restrict the user so only
those privileges assigned may be invoked. When additional privileges beyond those needed to do a job are
denied to an employee, the denied privileges cannot be used to bypass the organization’s security policies.
7 Source: www.knowledgeleader.com