Password and Access Control Policy Summary

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which role is responsible for informing IT of new employees, changes to access rights, and leavers?

  • Information Security Manager
  • Systems administrators
  • Security Management Team
  • HR role/line manager (correct)

Who reviews and approves access requests and audits user and access lists quarterly?

  • Security Management Team
  • Information Security Manager (correct)
  • HR role/line manager
  • Systems administrators

What must systems administrators adhere to when making changes to access privileges?

  • Password and Access Control Policy (correct)
  • Network Configuration Policy
  • Information Security Policy
  • HR Policy

Based on what are user authentication and access granted?

<p>Business needs (B)</p> Signup and view all the answers

What is prohibited in terms of user authentication?

<p>Shared user IDs (A)</p> Signup and view all the answers

What must be implemented for operating system access, web applications, voice inquiries, email, fax, white mail, remote access, and network devices?

<p>Two-factor authentication (B)</p> Signup and view all the answers

What must passwords not be?

<p>All of the above (D)</p> Signup and view all the answers

How long is the password lockout duration set to?

<p>30 minutes (D)</p> Signup and view all the answers

Who can approve deviations from the Password and Access Control Policy?

<p>Security Management Team and/or Legal Counsel (C)</p> Signup and view all the answers

Study Notes

Password and Access Control Policy Document Control Summary

  • The Password and Access Control Policy sets out specific responsibilities, conditions, and practices to minimize risks and protect physical assets and sensitive information.
  • The policy applies to all systems and assets owned, managed, or operated by the organization.
  • The HR role/line manager is responsible for informing IT of new employees, changes to access rights, and leavers.
  • The Information Security Manager reviews and approves access requests and audits user and access lists quarterly.
  • Systems administrators must adhere to the policy when making changes to access privileges and ensure systems enforce the policy configurations.
  • User authentication is based on business needs, with access granted based on job classification and function.
  • Non-authenticated or shared user IDs are prohibited, and every user must have a unique user ID and personal secret password.
  • Authentication mechanisms must be suited for the delivery channel and implemented with appropriate strength.
  • Secure authentication mechanisms must be implemented for operating system access, web applications, voice inquiries, email, fax, white mail, remote access, and network devices.
  • Access control configurations include unique IDs, unique passwords, password changes, password history, password lockouts, and two-factor authentication for remote access.
  • Passwords must not be shared, stored in the clear, or reused. Password lockout duration is set to 30 minutes.
  • Violating the policy may result in disciplinary action, and deviations are permitted only with approval from the Security Management Team and/or Legal Counsel.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser