Password and Access Control Policy Summary
9 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which role is responsible for informing IT of new employees, changes to access rights, and leavers?

  • Information Security Manager
  • Systems administrators
  • Security Management Team
  • HR role/line manager (correct)
  • Who reviews and approves access requests and audits user and access lists quarterly?

  • Security Management Team
  • Information Security Manager (correct)
  • HR role/line manager
  • Systems administrators
  • What must systems administrators adhere to when making changes to access privileges?

  • Password and Access Control Policy (correct)
  • Network Configuration Policy
  • Information Security Policy
  • HR Policy
  • Based on what are user authentication and access granted?

    <p>Business needs</p> Signup and view all the answers

    What is prohibited in terms of user authentication?

    <p>Shared user IDs</p> Signup and view all the answers

    What must be implemented for operating system access, web applications, voice inquiries, email, fax, white mail, remote access, and network devices?

    <p>Two-factor authentication</p> Signup and view all the answers

    What must passwords not be?

    <p>All of the above</p> Signup and view all the answers

    How long is the password lockout duration set to?

    <p>30 minutes</p> Signup and view all the answers

    Who can approve deviations from the Password and Access Control Policy?

    <p>Security Management Team and/or Legal Counsel</p> Signup and view all the answers

    Study Notes

    Password and Access Control Policy Document Control Summary

    • The Password and Access Control Policy sets out specific responsibilities, conditions, and practices to minimize risks and protect physical assets and sensitive information.
    • The policy applies to all systems and assets owned, managed, or operated by the organization.
    • The HR role/line manager is responsible for informing IT of new employees, changes to access rights, and leavers.
    • The Information Security Manager reviews and approves access requests and audits user and access lists quarterly.
    • Systems administrators must adhere to the policy when making changes to access privileges and ensure systems enforce the policy configurations.
    • User authentication is based on business needs, with access granted based on job classification and function.
    • Non-authenticated or shared user IDs are prohibited, and every user must have a unique user ID and personal secret password.
    • Authentication mechanisms must be suited for the delivery channel and implemented with appropriate strength.
    • Secure authentication mechanisms must be implemented for operating system access, web applications, voice inquiries, email, fax, white mail, remote access, and network devices.
    • Access control configurations include unique IDs, unique passwords, password changes, password history, password lockouts, and two-factor authentication for remote access.
    • Passwords must not be shared, stored in the clear, or reused. Password lockout duration is set to 30 minutes.
    • Violating the policy may result in disciplinary action, and deviations are permitted only with approval from the Security Management Team and/or Legal Counsel.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz provides a summary of the Password and Access Control Policy, outlining responsibilities, best practices, and precautions to protect organizational assets and sensitive information. It covers aspects such as user authentication, access control configurations, and consequences of policy violations.

    More Like This

    Use Quizgecko on...
    Browser
    Browser