quiz image

Password and Access Control Policy

CommendableRuby avatar
CommendableRuby
·
·
Download

Start Quiz

9 Questions

Which standard does the Password and Access Control Policy aim to meet?

PCI DSS

Who is responsible for informing IT of new employees and changes to access rights?

Human Resources

What principle does user authentication follow?

Principle of least privilege

What is prohibited in terms of user IDs?

Shared user IDs

What is required for operating system access authentication?

Role-based access control and password authentication

What is required for web authentication for applications?

Secure mechanism and role-based access control with password authentication

What is required for voice authentication?

Verification of caller identity

What is required for email authentication?

Scanning attachments for viruses

What is required for network device authentication?

Encrypted protocols for access

Study Notes

Password and Access Control Policy

  • The Password and Access Control Policy is a document that outlines specific responsibilities, conditions, and practices to minimize risks and protect physical assets and sensitive information.
  • The policy is designed to meet the requirements of the Payment Card Industry Data Security Standard (PCI DSS).
  • The policy applies to all systems and assets owned, managed, or operated by the organization.
  • The roles and responsibilities include HR informing IT of new employees and changes to access rights, the Information Security Manager approving access requests, and Systems Administrators adhering to the policy when making changes to access privileges.
  • User authentication is based on business needs and follows the principle of least privilege.
  • Non-authenticated or shared user IDs are prohibited, and every user must have a unique user ID and personal secret password.
  • Authentication mechanisms must be suited for the delivery channel and implemented with appropriate strength to manage information security risks.
  • Operating system access authentication requires a secure mechanism for remote or console access, with role-based access control and password authentication.
  • Web authentication for applications must implement a secure mechanism and role-based access control with password authentication.
  • Voice authentication requires verification of caller identity to prevent "social engineering" attacks.
  • Email authentication involves scanning attachments for viruses, confirming sender identity, and handling requests with care.
  • Network device authentication requires encrypted protocols for access, with exceptions for local console access.

This quiz covers the Password and Access Control Policy, which outlines responsibilities, conditions, and practices to minimize risks and protect physical assets and sensitive information. It includes user authentication, access control mechanisms for various systems, and roles and responsibilities of different stakeholders. The policy is designed to meet PCI DSS requirements.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser