Password and Access Control Policy: Summary
9 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which role is responsible for informing IT of new employees, changes to access rights, and leavers?

  • Information Security Manager
  • Security Management Team
  • HR role/line manager (correct)
  • Systems Administrators
  • Who approves access requests and audits user and access lists on a quarterly basis?

  • Security Management Team
  • Information Security Manager (correct)
  • Systems Administrators
  • HR role/line manager
  • What must Systems Administrators adhere to when making changes to access privileges?

  • Least privilege and need-to-know basis (correct)
  • Password history
  • Vendor remote access accounts
  • Password lockout and duration
  • What is prohibited in user authentication?

    <p>Non-authenticated and shared/group user IDs</p> Signup and view all the answers

    What are the requirements for passwords?

    <p>At least 8 characters with a mix of upper and lower case letters, numbers, and special characters</p> Signup and view all the answers

    What should remote access utilize?

    <p>Two-factor authentication</p> Signup and view all the answers

    What should be done with vendor remote access accounts?

    <p>Monitored and passwords changed regularly</p> Signup and view all the answers

    What may result in disciplinary action?

    <p>Violations of the policy</p> Signup and view all the answers

    What is required for deviations from the policy?

    <p>Valid business case reviewed and approved by the Security Management Team and/or Legal Counsel</p> Signup and view all the answers

    Study Notes

    Password and Access Control Policy Document Control Summary

    • The Password and Access Control Policy sets out specific responsibilities, conditions, and practices to minimize risks and protect physical assets and sensitive information.
    • The policy applies to all systems and assets owned, managed, or operated by the company.
    • The HR role/line manager is responsible for informing IT of new employees, changes to access rights, and leavers.
    • The Information Security Manager approves access requests and audits user and access lists on a quarterly basis.
    • Systems Administrators must adhere to the policy when making changes to access privileges and ensure systems enforce the configurations in the policy.
    • User authentication is based on job classification and function, with the principle of least privilege and need-to-know basis.
    • Non-authenticated and shared/group user IDs are prohibited, and every user must have a unique user ID and personal secret password.
    • Different authentication mechanisms are required for user, operating system, web, voice, email, fax, white mail, remote access, and network device authentication.
    • Passwords must not be shared, must be at least 8 characters with a mix of upper and lower case letters, numbers, and special characters.
    • Password history is maintained, password lockout and duration are set, and remote access should utilize two-factor authentication.
    • Vendor remote access accounts should be monitored, passwords changed regularly, and unused accounts deactivated.
    • Violations of the policy may result in disciplinary action, and deviations require a valid business case reviewed and approved by the Security Management Team and/or Legal Counsel.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Learn about the Password and Access Control Policy which outlines responsibilities, conditions, and practices to protect physical assets and sensitive information. The policy covers user authentication, password requirements, access control mechanisms, and consequences for policy violations.

    More Like This

    Use Quizgecko on...
    Browser
    Browser