New Microsoft Word Document
New Microsoft Word Document
3. Policy Statements:
4. Service Accounts:
- Examples: Accounts for applications or scripts.
- Purpose: Facilitate automated tasks like database backups or application
integration.
- Restrictions: Non-interactive and monitored for anomalous behavior.
3. Approval:
- The department head must approve all account creation requests.
- Privileged account requests require approval from the Information Security
Officer (ISO).
4. Implementation:
Once approved, the IT team will create the account and assign access
permissions based on the requester’s role.
A unique user ID and temporary password will be issued, requiring the user to
reset the password upon first login.
2. Regular Audits:
- The Information Security Team will conduct audits quarterly to detect
unauthorized access, dormant accounts, and policy violations.
3. Incident Response:
- Any suspicious or unauthorized activity must be escalated to the Information
Security Incident Response Team (ISIRT) within 24 hours.
2. Dormant Accounts:
- Accounts inactive for 90 days will be flagged for review.
- If no justification is provided, they will be disabled.
3. Guest Accounts:
- Automatically expire after the pre-approved duration. Extensions require
new approvals.
4. Roles and Responsibilities
1. System Administrators:
- Manage account lifecycles and implement access controls.
2. Department Heads:
- Authorize account creation and review access requests.
3. Users:
- Protect account credentials and report suspicious activity.
5. Human Resources:
- Notify the IT team of employee departures promptly to ensure timely
account termination.
2. Penalties:
- Unauthorized access or misuse of accounts may lead to:
- Account suspension.
- Academic penalties for students.
- Termination of employment for staff.
- Legal action under applicable laws.