quiz image

Password and Access Control Policy: Summary

CommendableRuby avatar
CommendableRuby
·
·
Download

Start Quiz

Questions and Answers

Which role is responsible for informing IT of new employees, changes to access rights, and leavers?

HR role/line manager

Who approves access requests and audits user and access lists on a quarterly basis?

Information Security Manager

What must Systems Administrators adhere to when making changes to access privileges?

Least privilege and need-to-know basis

What is prohibited in user authentication?

<p>Non-authenticated and shared/group user IDs</p> Signup and view all the answers

What are the requirements for passwords?

<p>At least 8 characters with a mix of upper and lower case letters, numbers, and special characters</p> Signup and view all the answers

What should remote access utilize?

<p>Two-factor authentication</p> Signup and view all the answers

What should be done with vendor remote access accounts?

<p>Monitored and passwords changed regularly</p> Signup and view all the answers

What may result in disciplinary action?

<p>Violations of the policy</p> Signup and view all the answers

What is required for deviations from the policy?

<p>Valid business case reviewed and approved by the Security Management Team and/or Legal Counsel</p> Signup and view all the answers

Study Notes

Password and Access Control Policy Document Control Summary

  • The Password and Access Control Policy sets out specific responsibilities, conditions, and practices to minimize risks and protect physical assets and sensitive information.
  • The policy applies to all systems and assets owned, managed, or operated by the company.
  • The HR role/line manager is responsible for informing IT of new employees, changes to access rights, and leavers.
  • The Information Security Manager approves access requests and audits user and access lists on a quarterly basis.
  • Systems Administrators must adhere to the policy when making changes to access privileges and ensure systems enforce the configurations in the policy.
  • User authentication is based on job classification and function, with the principle of least privilege and need-to-know basis.
  • Non-authenticated and shared/group user IDs are prohibited, and every user must have a unique user ID and personal secret password.
  • Different authentication mechanisms are required for user, operating system, web, voice, email, fax, white mail, remote access, and network device authentication.
  • Passwords must not be shared, must be at least 8 characters with a mix of upper and lower case letters, numbers, and special characters.
  • Password history is maintained, password lockout and duration are set, and remote access should utilize two-factor authentication.
  • Vendor remote access accounts should be monitored, passwords changed regularly, and unused accounts deactivated.
  • Violations of the policy may result in disciplinary action, and deviations require a valid business case reviewed and approved by the Security Management Team and/or Legal Counsel.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Use Quizgecko on...
Browser
Browser