Access Control Policy 0
Access Control Policy 0
1. Table of Contents
1. Table of Contents ....................................................................................................................... 2
2. Property Information ................................................................................................................... 3
3. Document Control ...................................................................................................................... 4
3.1. Information............................................................................................................ 4
3.2. Revision History ................................................................................................... 4
3.3. Review, Verification and Approval ...................................................................... 4
3.4. Distribution List .................................................................................................... 4
4. Policy Overview .......................................................................................................................... 5
4.1. Purpose ................................................................................................................. 5
4.2. Scope..................................................................................................................... 5
4.3. Terms and Definitions .......................................................................................... 5
4.4. Change, Review and Update ............................................................................... 7
4.5. Enforcement / Compliance .................................................................................. 7
4.6. Waiver.................................................................................................................... 7
4.7. Roles and Responsibilities (RACI Matrix) .......................................................... 8
4.8. Relevant Documents ............................................................................................ 8
4.9. Ownership ............................................................................................................. 9
5. Policy Statements ...................................................................................................................... 10
5.1. Access Control Policy........................................................................................ 10
5.2. Access to Networks and Network Services ..................................................... 11
5.3. User Registration and De-Registration............................................................. 13
5.4. User Access Provisioning ................................................................................. 14
5.5. Management of Privileged Access Rights ....................................................... 15
5.6. Management of Secret Authentication Information of Users ......................... 15
5.7. Review of User Access Rights .......................................................................... 16
5.8. Removal or Adjustment of Access Rights ....................................................... 17
5.9. Use of Secret Authentication Information ........................................................ 17
5.10. Information Access Restriction....................................................................... 18
5.11. Secure Log-On Procedures ............................................................................. 19
5.12. Password Management System ...................................................................... 19
5.13. Use of Privileged Utility Programs .................................................................. 20
5.14. Access Control to Program Source Code ...................................................... 20
Page 2/19
ACCESS CONTROL POLICY
2. Property Information
This document is the property information of Imam Abdulrahman bin Faisal University - ICT Deanship. The
content of this document is Confidential and intended only for the valid recipients. This document is not
to be distributed, disclosed, published or copied without ICT Deanship written permission.
Page 3/19
ACCESS CONTROL POLICY
3. Document Control
3.1. Information
Page 4/19
ACCESS CONTROL POLICY
4. Policy Overview
This section describes and details the purpose, scope, terms and definitions, change, review and update,
enforcement / compliance, wavier, roles and responsibilities, relevant documents and ownership.
4.1. Purpose
The main purpose of Access Control Policy is to:
Limit access to information and information processing facilities, ensure authorized user access and to prevent
unauthorized access to systems and services, make users accountable for safeguarding their authentication
information, and prevent unauthorized access to systems and applications.
4.2. Scope
The policy statements written in this document are applicable to all IAU’s resources at all levels of sensitivity;
including:
All full-time, part-time and temporary staff employed by, or working for or on behalf of IAU.
All other individuals and groups who have been granted access to IAU’s ICT systems and
information.
This policy covers all information assets defined in the Risk Assessment Scope Document and will be used as a
foundation for information security management.
Term Definition
Page 5/19
ACCESS CONTROL POLICY
In case of ignoring or infringing the information security directives, IAU’s environment could be harmed (e.g.,
loss of trust and reputation, operational disruptions or legal violations), and the fallible persons will be made
responsible resulting in disciplinary or corrective actions (e.g., dismissal) and could face legal investigations.
A correct and fair treatment of employees who are under suspicion of violating security directives (e.g.,
disciplinary action) has to be ensured. For the treatment of policy violations, Management and Human
Resources Department have to be informed and deal with the handling of policy violations.
4.6. Waiver
Information security shall consider exceptions on an individual basis. For an exception to be approved, a
business case outlining the logic behind the request shall accompany the request. Exceptions to the policy
compliance requirement shall be authorized by the Information Security Officer and approved by the ICT
Deanship. Each waiver request shall include justification and benefits attributed to the waiver.
The policy waiver period has maximum period of 4 months, and shall be reassessed and re-approved, if
necessary for maximum three consecutive terms. No policy shall be provided waiver for more than three
consecutive terms.
Page 7/19
ACCESS CONTROL POLICY
Roles
Dept.
ICT ISO HR/A Owner User
Mgr.
Responsibilities
Determining the required access rights of users to assets. R,C C C R,A I
Adhering to information security policies and procedures
C C C R,A,I
pertaining to the protection of information.
Reporting actual or suspected security incidents to ICT
A,C C I R
Deanship
Ensuring resigned or terminated employee return all IAU’s
assets interested before they complete termination C C R,A I
process.
Revoking access rights (logical and physical) to assets upon
R,A C C
employee termination or change.
Ensuring the protection of information / infrastructure
systems, according to the technological mechanisms defined R,A R,C
by the system / application design team.
Investigating breaches of security controls, and
implementing additional compensating controls when R,A R,C I
necessary.
Implementing proper controls to protect assets. R,A C I
Reviewing user access rights and privileges in a regular basis. R,A C C R,C
Approving user access registration form. C C R,A C I
Table 2: Assigned Roles and Responsibilities based on RACI Matrix
1
The responsibility assignment RACI matrix describes the participation by various roles in completing tasks for a business process. It is
especially useful in clarifying roles and responsibilities in cross-functional/departmental processes. R stands for Responsible who performs
a task, A stands for Accountable (or Approver) who sings off (approves) on a task that a responsible performs, C stands for Consulted
(or Consul) who provide opinions, and I stands for Informed who is kept up-to-date on task progress.
Page 8/19
ACCESS CONTROL POLICY
Compliance Policy
4.9. Ownership
This document is owned and maintained by the ICT Deanship of University of Imam Abdulrahman bin Faisal.
Page 9/19
ACCESS CONTROL POLICY
5. Policy Statements
The following subsections present the policy statements in 14 main aspects:
c. An identified business requirement for the user to have access to the information or business
process (both ‘need-to-know’ and ‘need-to-use’ principles).
d. All access is denied unless specifically approved under the provisions of this policy.
Page 10/19
ACCESS CONTROL POLICY
f. Legal and/or contractual obligation to restrict and protect access to IAU’s systems.
2. Access for contractors or third parties personnel to IAU’s business information assets shall be
provided only based on a contractual agreement. This agreement shall include, but not be limited to:
b. An identified business requirement for the user to have access to the network (e.g., use of
VPN or wireless network) or network services (‘need-to-have’ principle).
c. The user’s security classification and the security classification of the network.
f. The authorization mechanisms for determining who is allowed to access which networks and
network services.
2. All computers shall be not connected to IAU network and be allowed full access to all network
resources and the Internet unless they fulfil with the network access control requirements as follows:
Page 11/19
ACCESS CONTROL POLICY
3. Access to IAU wired and wireless network shall be provided for employees, students and guests as
per the following security requirements:
Security Requirements
Group
Wired Network Wireless Network
• Web redirection to Cisco Web NAC
definitions for an update not older than • Compliant users shall be granting access
5 days. to UC services using their mobile devices
Employees access to IAU network based on the • Compliant users shall be granting a
Port VLAN membership. limited access to only Internet
Page 12/19
ACCESS CONTROL POLICY
c. Sharing any non-related business materials (e.g., photos, videos, audio files, etc.) shall not be
permitted.
2. The granting of user access, changes to existing user access rights and removal of user access shall
be authorized by Owner taking into account the following:
b. Segregation of duties.
3. The process for managing user IDs shall address the following:
Page 13/19
ACCESS CONTROL POLICY
a. All IAU’s employees shall be identified with a unique ID that establishes identity. User ID
shall require at least one factor of authentication (e.g., password, token number or biometric
devices).
b. All IAU’s employees shall be registered by IAU’s formal approved user registration
procedure.
e. The number of privileged user IDs shall be strictly limited to those individuals who shall have
such privileges for authorized business purposes.
f. Multi-user systems administrators shall have at least two user-IDs to separate their privileged
access from their ordinary day-to-day access.
g. Consistent access control across different types of IAU’s systems shall be achieved by
supporting standard user ID codes, production programs and file names, and system names.
a. Date of authorization.
2. The provisioning process for assigning or revoking access rights for users shall consider the
followings:
d. Records reflecting all user access rights are centrally kept up-to-date.
Page 14/19
ACCESS CONTROL POLICY
e. Updating users access rights based on IAU’s employees roles and responsibilities.
3. ICT Deanship shall grant users access to IAU’s systems and services in accordance with their business
role and job description (i.e., access right profiles).
a. Identification of access rights required for each system or process (e.g., operation system,
database, application and network).
2. Users shall not have access to administration account or privileges on their local machines.
2. Prior to allowing user access to any IAU’s system or application, a password authentication method
shall be implemented as follows:
a. Password shall be a minimum of 8 characters length for normal users and 12 characters for
IT administrators (e.g., system admin, application admin, DB admin and network admin).
d. Passwords shall contain no more than two identical characters in a row and not made up of
all numeric or alpha characters.
f. Users shall be required to change their password immediately after their first login to any
system (i.e., It shall be configured to prompt a user to choose another password before
continuing with his session).
h. Password change shall be enforced (by the operating system or the application) at least every
90 days. Re-use of the same password shall not be allowed.
i. Initial password shall be only used one time (i.e., it shall be valid only for the involved user’s
first login) and shall be expired at 23:59:59 of the date issued.
j. Password shall be stored and transmitted in protected (e.g., encrypted or hashed) form, if
possible.
3. Passwords shall be immediately changed if there is any suspicion of password compromise; and this
shall be reported immediately to ICT Deanship.
4. ICT Deanship shall change all IAU’s systems and software default usernames and passwords upon
installation.
5. ICT Deanship shall reset user passwords after getting a formal verification of user identity.
2. All IAU’s users’ access rights shall be reviewed in accordance with the formally approved User
Physical and Local Access Control Procedure.
Page 16/19
ACCESS CONTROL POLICY
3. ICT Deanship in cooperation with Asset Owner and Information Security Officer shall:
▪ Access profiles for high risk systems (mission critical systems) every three months
c. ICT Deanship, unless notified to the contrary, shall purge all files held in the employee’s
directory one month after employment termination.
2. Users shall not capture or otherwise obtain passwords, decryption keys or any other secret
authentication method that could permit unauthorized access.
Page 17/19
ACCESS CONTROL POLICY
i. Write a password on a piece of paper and left in a place where unauthorized users are able
to discover them.
a. Passwords are always encrypted when held in storage or in system logs on any IAU’s system.
b. Passwords are not be stored in internet browsers (i.e., cookie on user’s workstations are
not set for automatic password completion and login).
c. Systems are designed, tested and controlled to prevent the retrieval of and the unauthorized
use of stored passwords.
c. Defining proper access privileges required (e.g., read, write, delete and execute).
d. Implementing logical and physical access isolation between different critical IAU’s systems.
Page 18/19
ACCESS CONTROL POLICY
2. All systems shall display a general notice warning message that access to IAU’s systems is granted to
authorized users only.
3. The logon process on any system shall display only the limited information about the system and its
purposed use.
4. When strong authentication and identification is required, authentication methods other than
passwords (e.g., token IDs, smart cards or biometrics) shall be implemented.
5. All systems shall limit the number of unsuccessful logon attempts allowed; the following shall be
considered:
b. Forcing a time delay before further logon attempts are allowed or rejecting any further
attempts without specific authorization.
c. Sending an alarm message to the system console if the maximum number of logon attempts
is reached.
6. ICT Administrators (e.g., system admin, application admin, DB admin and network admin) shall review
all unsuccessful log attempts in a periodically basis.
Page 19/19
ACCESS CONTROL POLICY
2. All access to system utilities shall be logged and reviewed by the relevant ICT Deanship.
2. ICT Deanship shall ensure that all source codes are compiled, controlled and maintained centrally.
Page 20/19