Identity & Access Management Policy
Topics covered
Identity & Access Management Policy
Topics covered
The authentication process maintains security by validating identities through a combination of public identifiers like usernames and private information such as PINs or passwords . Policies require the use of encrypted authentication mechanisms, initial password changes upon first login, and reset of vendor-supplied default or blank passwords immediately upon installation . Additionally, privileged accounts must adhere to these standards, with shared passwords changed every ninety days and upon personnel changes . These measures ensure secure management and use of user credentials.
The IAM policy ensures compliance by requiring system owners to maintain documented procedures for access control and make them available for auditing purposes . Evidence of account approval, termination, and disabling must also be available when required for audits . This documentation enables audits to verify that access is appropriately managed, providing transparency and accountability for the organization's information security practices.
Procedures for managing account deletions require reporting separations promptly, while immediate deactivation is mandated for terminations with cause . These procedures are important to prevent unauthorized access by former employees and to protect sensitive information from being accessed by individuals who no longer have legitimate reasons or responsibilities to access those systems . This timely management of account deletions helps maintain the integrity and security of the systems.
The main principles driving the Identity and Access Management policy include access control, confidentiality, principle of least privilege, and separation of duties. Access control is essential to prevent unauthorized access to IT systems . Confidentiality protects sensitive information from being disclosed to unauthorized individuals . The principle of least privilege ensures users have access only to the resources they need to perform their duties, reducing the risk of misuse . Separation of duties involves assigning responsibilities to different individuals to prevent fraud or abuse . These principles collectively uphold information security by ensuring that only authorized individuals can access necessary data and systems, reducing the likelihood of breaches.
Data owners are responsible for establishing data access procedures, including overseeing access requests and ensuring only necessary access is provided . They must authorize access changes on request forms along with the requesting user and their supervisor . Data owners play a crucial role in maintaining the principle of least privilege and ensuring compliance with corporate access policies, thereby protecting sensitive information from unauthorized access and misuse.
The IAM policy requires privileged accounts, such as root or superuser accounts, to support individual user authentication where possible and to use separate accounts for privileged and unprivileged access . Shared passwords for group administrative purposes must be changed every ninety days and after any personnel changes . These measures are necessary to prevent unauthorized access, limit potential damage from credential theft, and ensure accountability by logging and identifying specific users who access privileged functions.
Having an encrypted authentication mechanism is important because it protects authentication credentials from interception or unauthorized access during communication, thus maintaining the confidentiality and integrity of the login process . This is crucial in preventing attacks such as man-in-the-middle where an attacker could potentially intercept unencrypted credentials and gain unauthorized access to systems and sensitive data.
The IAM policy ensures the principle of least privilege during role changes or transfers by requiring all accounts to be disabled and privileges removed initially, then re-enabled with only the necessary privileges for the new role . Access request forms must be used to manage these changes and must be authorized by the requester, their supervisor, and the data owner . This prevents former access rights from carrying over unnecessarily, aligning access privileges strictly with current job requirements.
The separation of duties in the IAM policy is based on the rationale of preventing fraud, abuse, and other harms by ensuring that no single person has control over all aspects of any critical task . By dividing tasks among different individuals, it reduces the risk of unauthorized actions and enhances the detection of errors or malfeasance. It acts as a safeguard against conflicts of interest and offers a system of checks and balances within the organization.
The IAM policy defines identification as the assignment of a unique identifier, such as a user ID, to each individual for access level decisions . Authentication involves validating the declared identity through both a public identifier and private information like passwords . Systems must use secure, encrypted mechanisms for authentication, including password changes on first login and resetting vendor defaults . These processes safeguard against unauthorized access by ensuring only legitimate users can authenticate.