The document discusses access control and is divided into four sections. It outlines business requirements for access control, how to manage user access and responsibilities, and how to control system and application access. The goal is to ensure only authorized access and prevent unauthorized access to networks, services, systems and applications. It provides controls and guidelines for access provisioning, authentication, authorization reviews and removing access when no longer needed.
The document discusses access control and is divided into four sections. It outlines business requirements for access control, how to manage user access and responsibilities, and how to control system and application access. The goal is to ensure only authorized access and prevent unauthorized access to networks, services, systems and applications. It provides controls and guidelines for access provisioning, authentication, authorization reviews and removing access when no longer needed.
Business requirements of access control Objective: To ensure that employees and contractors understand their responsibilities and are suitable for the roles for which they are considered
Access to networks and network
Access control policy services Control Control • An access control policy should be • Users should only be provided with established, documented and reviewed access to the network and network based on business and information services that they have been specifically security requirements. authorized to use.
User access management Objective: To ensure authorized user access and to prevent unauthorized access to systems and services.
User registration and User access Management of
de-registration provisioning privileged access rights Control Control Control • A formal user registration • A formal user access • The allocation and use of and de-registration process provisioning process should privileged access rights should be implemented to be implemented to assign should be restricted and enable assignment of or revoke access rights for controlled. access rights. all user types to all systems and services.
User access management Objective: To ensure authorized user access and to prevent unauthorized access to systems and services.
Management of secret Review of user access Removal or adjustment
authentication information of users rights of access rights Control Control Control • The allocation of secret • Asset owners should review • The access rights of all authentication information users’ access rights at employees and external should be controlled regular intervals. party users to information through a formal and information processing management process. facilities should be removed upon termination of their employment, contract or agreement, or adjusted upon change
System and application access control Objective: To prevent unauthorized access to systems and applications.
Information access Secure log-on Password
restriction procedures management system Control Control Control • Access to information and • Where required by the • Password management application system access control policy, systems should be functions should be access to systems and interactive and should restricted in accordance applications should be ensure quality passwords. with the access control controlled by a secure log- policy. on procedure..
System and application access control Objective: To prevent unauthorized access to systems and applications.
Access control to program source
Use of privileged utility programs code Control Control • The use of utility programs that might be • Access to program source code should be capable of overriding system and restricted. application controls should be restricted and tightly controlled.