Authentication and Authorization

Created by Danny Wong, Modified on Sun, 25 Oct 2020 at 01:19 PM by Danny Wong

Policy Statement

In accordance with the Business Data Classification Policy, all information systems that create, receive, store, or transmit data classified as 'Confidential' must adhere to the authentication and authorization principles of this document.


Reason for Policy

State and federal regulations, as well as general best practices, shape the security and privacy protections that must be afforded to data classified as "Confidential". This policy addresses regulatory and best practice requirements to ensure proper authentication and authorization to Confidential data.


Who Should Read this Policy

All users of Business.


Principles

Information systems or applications that create, receive, store, or transmit Confidential data (hereafter "Confidential Systems" - see Data Classification policy) must, without exclusion, adhere to the following:


Access

  1. Managers and administrators of Confidential systems are responsible for ensuring access to those systems is based on work function and is controlled using the minimum necessary standard. Documented procedures for ensuring appropriate access to Confidential Systems must include:
    1. Authorization methods (e.g. using a Business Access Login), including manner and type of authorized administrative access
    2. Authentication methods (e.g. requiring passwords), including manner and type of authentication
    3. Methods for evaluating access to Confidential systems based on the need to fulfill an appropriate business purpose
    4. Documentation of each workforce member's and vendor's access rights to Confidential systems
    5. Acknowledgement forms, signed by the appropriate supervisors, which document that they have knowingly and willingly authorized access rights to Confidential systems to appropriate workforce members and vendors
    6. Acknowledgement forms, signed by the appropriate workforce members and vendors, which document that all appropriate parties are aware of their authorized access rights to Confidential systems
    7. A formal process for annually reviewing and revising workforce member and vendor access to Confidential systems
    8. A formal process for the timely termination of workforce member and vendor access to Confidential systems whenever appropriate (e.g. immediately upon end of employment).
    9. A formal process for the timely change of workforce member and vendor access to Confidential systems whenever appropriate (e.g. after a change in role or position).
    10. A formal process for regularly assessing effectiveness of access controls to Confidential systems
    11. A formal process for providing, and subsequently removing, electronic access to Confidential systems to appropriate workforce members and vendors during an emergency

Unique User Identification

  1. All electronic access to Confidential systems must be the result of using a unique identifier, such as a username and password. Users are only granted one unique Business Access Login and password. Using another user's account to access Confidential systems is prohibited. Violators will be subject to disciplinary action.
  2. Managers and administrators of Confidential systems are responsible for ensuring that access technologies and methodologies for those systems incorporate the following:
    1. Usage of "strong" (difficult to guess) passwords that contain, at minimum, a combination of capital and lower-case letters, and numbers
    2. Usage of "unique" (not shared among multiple users) user ID's (e.g. Business Access Login) with appropriate authentication mechanism (passwords, tokens, biometrics, etc)
    3. Forced periodic password changes of, at minimum, every 180 days (at least every 90 days for users who handle credit card transactions)
    4. Enforced prohibition of password reuse
    5. Enforced prohibition of sharing or disclosing of password

Gaining access

  1. Gaining access to Confidential systems or data by using credentials other than one's own makes it impossible to properly log and audit access. Therefore, it is not acceptable for any user to use another user's authorization credentials (e.g. Business Access Login and password) to gain access to any Confidential IT resources. It is additionally not acceptable for any user to act on behalf of another user when accessing IT resources unless this practice has been documented and approved by a supervisor of that system.
  2. In some circumstances, such as in research labs or warehouse systems, is it acceptable to use a 'shared' account for login only to computer workstations. In cases where shared accounts are preferred or required, managers and administrators of confidential systems must ensure that shared accounts are used only to login (authenticate) to those systems, and not for authenticating to applications accessible from the system. It is never acceptable to use a shared account to access applications, databases, or other systems that store Confidential data. Accounts used in this shared manner must never be normal user accounts (e.g. Business Access Login), but should instead be accounts created solely for the purpose of logging into limited numbers of computer workstations.

Audit Controls

  1. All access to Confidential systems and data must be electronically logged. Logged data must be audited on a predetermined basis; at least annually. Documentation of audits must be kept for at least 2 years. Discrepancies or access violations found through audits should be reviewed and remediated.
  2. Audit logging should be deployed in layers: at the network, application, back-end database, and system levels, and incorporate the following:
  3. Access logs - systems or security administrators must have procedures in place to log and review administrative and user access to IT resources.
  4. Activity logs - systems or security administrators should log and review user activity, such as data insertions, revisions, changes, or deletions
  5. Systems monitoring - systems or security administrators should monitor IT resources for anomalies such as changes in performance, network traffic, and intrusion detection.

Account Lockout

  1. In accordance with industry security standards, user accounts will be locked out for a period of time after multiple incorrect login attempts to protect against brute-force attacks. Users will be able to attempt login again after the period of time has passed.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select atleast one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article