Bulletin Board - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
(1) The (2) Access management ensures only those with a legitimate need can access our (3) Most (4) (5) This document provides the (6) This document applies to all (7) This document should be read and understood by (8) All persons accessing (9) Table 1 describes account types and their use. (10) Access to all (11) Digital Access Reviews ensure that security principles are adhered to, and that access which violates one or more of the principles is revoked or remediated. Security principles are detailed in the Information Security Policy. (12) Digital Access Reviews are an important governance tool used to provide auditable assurance that the (14) Failure to complete access reviews aligned with this standard places (15) Access to systems must be regularly reviewed to ensure only persons with legitimate access requirements retain access and that security principles are adhered to. Minimum review periods are listed below: (16) Access reviews must also be conducted immediately in the following scenarios: (17) To support the repeatable nature and auditability of access reviews, (18) The following technical controls that should be applied to all (19) Access to all (20) Users must be authenticated using multifactor authentication (MFA) prior to being granted access to (21) If MFA cannot be used, users must be authenticated by a long passphrase that the meets length and complexity requirements in Clause 43. (22) Where systems cannot support MFA, passphrases must be changed at least once every 365 days. If passphrase expiration cannot be enforced by the system, users must manually change their passphrase using the (23) Default, generic and shared accounts should not be used except for break-glass scenarios or cloud tenant administration. (24) Default and generic accounts should be renamed and disabled/removed (except for break-glass and cloud tenant administration). (25) The use of generic and shared accounts for break-glass scenarios and cloud tenant administration, must be attributable to an individual. (26) A separate privileged user account must be created for system administration. (27) Non-privileged activities must be performed using a standard user account. (28) Standard user accounts must not be used to run system services. (29) Service accounts must not be shared between applications or services, i.e., a separate account must be created for each application and service. (30) Standard users and administrators are not permitted to interactively log-in using service account credentials, except, as required to support or troubleshoot the specific service. (31) All access to (32) Passphrases must be issued using secure means. (33) First-use passphrases must be randomly generated. (34) Passphrases must be changed by a user upon first login. (35) Default passphrases on all systems, network resources, applications and databases must be immediately changed to a unique passphrase. (36) Unique passphrases must be used for each system. (37) Passphrases must not be shared i.e., known to more than one individual. (38) User identities must be verified prior to resetting passphrases. (39) The minimum age for passphrases should be 1 day or greater. (40) Passphrases used for single-factor authentication must be a list of random words, with a minimum length of 14 characters. (41) Passphrases should not contain any identification information or be the same as the last 10 passphrases. (42) MFA should require the use of a passphrase and a universal 2nd Factor security key, software based one-time passphrase token, physical one-time token, biometric authentication, or SMS. (43) Passphrases implemented as part of MFA must be at least 10 characters in length. (44) Passphrases for generic, default, shared, local administrator and service accounts must be at least 20 characters in length. (45) Passcodes for mobile phones must be at least 4 digits, or a biometric authentication with a passcode as a backup if the biometric fails. (46) Passphrases and passcodes must not be written down or stored in plain text. (47) If passphrase management software is used, the passphrase to access this software should be unique and meet the requirements of a local administrator/service account passphrase. (48) Cloud-based passphrase management software should be used with MFA. (49) If a passphrase has been shared with DTS for troubleshooting, the passphrase must be changed once the work is complete. (50) If an account or passphrase is suspected to have been compromised, the incident must be reported to the 17000 IT Service Desk and the passphrase must be changed immediately. (51) Credentials (i.e., the combination of username and passphrase) must be kept separate from the systems that they are used to authenticate to. (52) Credentials must be obscured as they are entered into systems to protect credentials from compromise. (53) Credentials stored on systems must be protected by a passphrase manager, a hardware security module, or by adopting methods such as salting, hashing, and stretching them before storage. (54) Windows Defender Credential Guard and Windows Defender Remote Credential Guard should be enabled where available to provide additional protection for credentials. (55) Privileged user accounts in Windows should be placed in a Protected Users security group where available. This security group will apply non-configurable protections to privileged user’s credentials. (56) Service accounts for Windows servers should be created as group Managed Service Accounts. This feature provides automated credential management and ensures service account credentials are long, unique, unpredictable, and managed. (57) Cached credentials should be limited to one previous logon to prevent the retrieval of cached credentials by an adversary. (58) The following controls should be implemented for (59) Email alerts should be sent to users when a login is detected from a new device. (60) Passphrases for break-glass accounts should be machine-generated and held in the (61) A break-glass procedure must be created by the (62) If a break-glass account is used, access to the account must be: (63) Passwords for break-glass accounts must be changed immediately after each time they are used. (64) User access, user queries, and user actions on databases should occur only through programmatic methods. Programmatic access refers to the use of a programming language to access a database, which provides more security than direct/manual access. (65) Only database administrators should be able to directly access or query databases. (66) Application IDs for database applications should only be used by the applications (and not by individual users or other non-application processes). (67) SNMP version 1 should not be used to monitor network devices as the protocol versions are insecure. (68) Default SNMP community strings on network devices should be changed and write access disabled. (69) SNMP community strings must meet the requirements of a local administrator/service account password. (70) SNMP community strings should be changed when someone leaves the University who would know or had used the password. (71) SSH version 1 should be disabled. Only SSH version 2 should be used. (72) Public key-based authentication should be used for SSH connections. (73) SSH private keys should be protected with a password or key encrypting key. (74) When SSH-agent or similar key caching programs are used, the program should be limited to workstations and servers with screen locks and key caches should expire within 4 hours of inactivity. (75) SSH daemon should be configured to: (76) When using logins without a password for SSH connections, the following should be disabled: (77) (78) The following controls should be implemented to restrict administrative and privileged accounts: (79) Due to the wide variety of specialty devices and their frequently limited capabilities, particularly regarding passphrase management, specialty devices such as fax machines, printers, physical access control equipment, copy machines, specialty lab equipment, phones, etc. are not subject to these requirements unless those devices are used to store or protect Highly Restricted information as defined by the Information Security Access Control Policy
Section 1 - Executive Summary
Section 2 - Purpose
Section 3 - Scope
Section 4 - Audience
Section 5 - Requirements
Types of Accounts
Type of Account
Description
Example
Standard user
Unique University-issued account assigned to
UniID, three letters and three number combination.
Privileged user (personal account)
Unique University-issued privileged account assigned to
Database, server, cloud, and domain administrator.
Local administrator
Privileged account that is created by default when an operating system is installed. The account sits outside the domain and has full control of the files, directories, services, and resources on the load device.
Default local user account on operating systems.
Service account or application account
An account used to run services and applications such as a file server, web server, e-mail server, etc., or used by applications to access databases and operating systems.
LocalSystem, NetworkService on Windows; cloud service account.
Generic/shared administrative account
Generic privileged account that exists on most devices and software by default. These accounts holder ‘super user’ privileges and are often shared among
Windows administrator, local admin, UNIX root, Orale SYS, AWS Root account, Azure Global admin.
Break glass account
Generic administrative account used for emergencies. These accounts usually provide the highest level of privilege. This account is only used for emergencies or to fix urgent problems.
Like generic/shared accounts.
Access Management
Digital Access Reviews
Technical Access Controls
Passphrases, Passcodes, and Multi-Factor Authentication
Credential Protection
Account Protection
Break-Glass Accounts
Database Access
Simple Network Management Protocol (SNMP) Community Name Requirements
Secure Shell (SSH) Keys
Segregation of Duties
Exemption for Specialty Devices