Document Feedback - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
Information Security Access Control Policy
Section 1 - Executive Summary
(1)
(2) Access management ensures only those with a legitimate need can access
(3) Most
(4)
Section 2 - Purpose
(5) This document provides the
Section 3 - Scope
(6) This document applies to all
Section 4 - Audience
(7) This document should be read and understood by
(8) All persons accessing
Section 5 - Requirements
Types of Accounts
(9) Table 1 describes account types and their use.
Type of Account | Description | Example |
---|---|---|
Standard user | Unique University-issued account assigned to |
UniID, three letters and three number combination. |
Privileged user (personal account) | Unique University-issued privileged account assigned to |
Database, server, cloud, and domain administrator. |
Local administrator | Privileged account that is created by default when an operating system is installed. The account sits outside the domain and has full control of the files, directories, services, and resources on the load device. | Default local user account on operating systems. |
Service account or application account | An account used to run services and applications such as a file server, web server, e-mail server, etc., or used by applications to access databases and operating systems. | LocalSystem, NetworkService on Windows; cloud service account. |
Generic/shared administrative account | Generic privileged account that exists on most devices and software by default. These accounts holder ‘super user’ privileges and are often shared among |
Windows administrator, local admin, UNIX root, Orale SYS, AWS Root account, Azure Global admin. |
Break glass account | Generic administrative account used for emergencies. These accounts usually provide the highest level of privilege. This account is only used for emergencies or to fix urgent problems. | Like generic/shared accounts. |
Access Management
(10) Access to all
- all decisions to grant, modify, or revoke a user’s access to
digital assets should be recorded in the service management tool that is available on theUniversity intranet; - access records should be retained for the life of the
digital asset and in line with the Records Governance Policy to ensure access decisions can be traced; - approval must be sought prior to granting, modifying, or revoking access as follows:
- for new
students , approval must be sought from the Deputy Vice-Chancellor (Academic) as part of the enrolment process; - for new
staff , approval must be sought from the Hiring Manager as part of the recruitment process; and - for
affiliates , approval must be sought from the authorisedUniversity staff member within the business unit orSchool .Affiliates requiring access toUniversity digital assets must have an activeUniversity sponsor.
- for new
- All users must acknowledge the
University's Digital Technology Conditions of Use Policy prior to being granted access. - Access to
digital assets must:- be role-based. This means that users should only be given access to the
digital assets they require to fulfil their role; - reflect the least privileges or permissions necessary to perform a role. Permissions may include the right to read, write, execute, or delete resources;
- be based on a need-to-know. This includes access to data, information, and documents;
- enforce the segregation of duties where there is a
risk of fraud, errors, or conflicts of interest. Refer to Clause 77-78 for details; - wherever possible, be revoked on the day they are no longer required. This applies to terminated employees, transfers to other areas, and changes to roles and responsibilities.
- be role-based. This means that users should only be given access to the
- if a
staff account is not accessed for 90 consecutive days, the account should be disabled on the 91st day. - All account provided to affiliates must include an expiration date that reflects the period of their relationship with the
University .
Digital Access Reviews
(11) Digital Access Reviews ensure that security principles are adhered to, and that access which violates one or more of the principles is revoked or remediated. Security principles are detailed in the Digital Security Policy.
(12) Digital Access Reviews are an important governance tool used to provide auditable assurance that the
- must ensure that access review procedures are completed within their required minimum review period as defined in Clause 15 and 16;
- are required to produce and maintain access review procedures and documentation for the systems they are responsible and accountable. Specific requirements are listed in clause 17;
- must record the authorisation, provision, and removal of access entitlements via the
University's approved identity and access management tool; - may allocate the responsibility for functional completion of access reviews to designated security officers or subject matter experts; and
- are responsible for producing reports to ensure access entitlement decisions and actions are readily available for audit.
(14) Failure to complete access reviews aligned with this standard places
(15) Access to systems must be regularly reviewed to ensure only persons with legitimate access requirements retain access and that security principles are adhered to. Minimum review periods are listed below:
- Standard user access must be reviewed at least every 12 months.
- Privileged user access must be reviewed at least every 3 months. This includes generic, shared, break glass, and root accounts.
- Segregation of duties must be reviewed at least every 12 months.
(16) Access reviews must also be conducted immediately in the following scenarios:
- User onboarding and offboarding, including access by third parties.
- Changes in user role or responsibility.
- Security breach or incident.
- User misconduct.
- Change in compliance legislation or regulation.
- Changes to policy or governance settings.
- Significant changes to infrastructure including growth, upgrades, and migrations.
(17) To support the repeatable nature and auditability of access reviews,
- List of systems/applications for which they are responsible.
- Access review schedule information for each system, including the type and cadence of review.
- A matrix of system roles and privileges.
- Entitlement mapping documentation indicating relationships between system roles and identity provider security groups, or role/attribute-based access logic.
- Toxic role combinations and fraud possibilities.
- Procedures and workflows used to identify, evaluate, authorise, and remediate access entitlements.
Technical Access Controls
(18) The technical controls described in clauses 19-31 should be applied to all
(19) Access to all
(20) Users must be authenticated using multifactor authentication (MFA) prior to being granted access to
(21) If MFA cannot be used, users must be authenticated by a long passphrase that the meets length and complexity requirements in Clause 43.
(22) Where systems cannot support MFA, passphrases must be changed at least once every 365 days. If passphrase expiration cannot be enforced by the system, users must manually change their passphrase using the
(23) Default, generic and shared accounts should not be used except for break-glass scenarios or cloud tenant administration.
(24) Default and generic accounts should be renamed and disabled/removed (except for break-glass and cloud tenant administration).
(25) The use of generic and shared accounts for break-glass scenarios and cloud tenant administration, must be attributable to an individual.
(26) A separate privileged user account must be created for system administration.
(27) Non-privileged activities must be performed using a standard user account.
(28) Standard user accounts must not be used to run system services.
(29) Service accounts must not be shared between applications or services, i.e., a separate account must be created for each application and service.
(30) Standard users and administrators are not permitted to interactively log-in using service account credentials, except, as required to support or troubleshoot the specific service.
(31) All access to
Passphrases, Passcodes, and Multi-Factor Authentication
(32) Passphrases must be issued using secure means.
(33) First-use passphrases must be randomly generated.
(34) Passphrases must be changed by a user upon first login.
(35) Default passphrases on all systems, network resources, applications and databases must be immediately changed to a unique passphrase.
(36) Unique passphrases must be used for each system.
(37) Passphrases must not be shared i.e., known to more than one individual.
(38) User identities must be verified prior to resetting passphrases.
(39) The minimum age for passphrases should be 1 day or greater.
(40) Passphrases used for single-factor authentication must be a list of random words, with a minimum length of 14 characters.
(41) Passphrases should not contain any identification information or be the same as the last 10 passphrases.
(42) MFA should require the use of a passphrase and a universal 2nd Factor security key, software based one-time passphrase token, physical one-time token or biometric authentication.
(43) Passphrases implemented as part of MFA must be at least 10 characters in length.
(44) Passphrases for generic, default, shared, local administrator and service accounts must be at least 20 characters in length.
(45) Passcodes for mobile phones must be at least 4 digits, or a biometric authentication with a passcode as a backup if the biometric fails.
(46) Passphrases and passcodes must not be written down or stored in plain text.
(47) If passphrase management software is used, the passphrase to access this software should be unique and meet the requirements of a local administrator/service account passphrase.
(48) Cloud-based passphrase management software should be used with MFA.
(49) If a passphrase has been shared with DTS for troubleshooting, the passphrase must be changed once the work is complete.
(50) If an account or passphrase is suspected to have been compromised, the incident must be reported to the 17000 IT Service Desk and the passphrase must be changed immediately.
Credential Protection
(51) Credentials (i.e., the combination of username and passphrase) must be kept separate from the systems that they are used to authenticate to.
(52) Credentials must be obscured as they are entered into systems to protect credentials from compromise.
(53) Credentials stored on systems must be protected by a passphrase manager, a hardware security module, or by adopting methods such as salting, hashing, and stretching them before storage.
(54) Windows Defender Credential Guard and Windows Defender Remote Credential Guard should be enabled where available to provide additional protection for credentials.
(55) Privileged user accounts in Windows should be placed in a Protected Users security group where available. This security group will apply non-configurable protections to privileged user’s credentials.
(56) Service accounts for Windows servers should be created as group Managed Service Accounts. This feature provides automated credential management and ensures service account credentials are long, unique, unpredictable, and managed.
(57) Cached credentials should be limited to one previous logon to prevent the retrieval of cached credentials by an adversary.
Account Protection
(58) The following controls should be implemented for
- Account lockout threshold: 5 invalid logon attempts;
- Account lockout duration: 15 minutes; and
- Reset account lockout counter after: 15 minutes.
(59) Where possible, systems should generate logs and alerts on suspicious logins and be centrally monitored by the Cyber Security team.
Break-Glass Accounts
(60) Passphrases for break-glass accounts should be machine-generated and held in the
(61) A break-glass procedure must be created by the
(62) If a break-glass account is used, access to the account must be:
- limited to the minimum amount of time necessary;
- associated to a change, problem, or incident number/ticket;
- recorded by the specific database, system, or application; and
- logged in an auditable record (which identifies the individual user who used the account), such as within the PAM platform.
(63) Passwords for break-glass accounts must be changed immediately after each time they are used.
Database Access
(64) User access, user queries, and user actions on databases should occur only through programmatic methods. Programmatic access refers to the use of a programming language to access a database, which provides more security than direct/manual access.
(65) Only database administrators should be able to directly access or query databases.
(66) Application IDs for database applications should only be used by the applications (and not by individual users or other non-application processes).
Simple Network Management Protocol (SNMP) Community Name Requirements
(67) SNMP version 1 should not be used to monitor network devices as the protocol versions are insecure.
(68) Default SNMP community strings on network devices should be changed and write access disabled.
(69) SNMP community strings must meet the requirements of a local administrator/service account password.
(70) SNMP community strings should be changed when someone leaves the University who would know or had used the password.
Secure Shell (SSH) Keys
(71) SSH version 1 should be disabled. Only SSH version 2 should be used.
(72) Public key-based authentication should be used for SSH connections.
(73) SSH private keys should be protected with a password or key encrypting key.
(74) When SSH-agent or similar key caching programs are used, the program should be limited to workstations and servers with screen locks and key caches should expire within 4 hours of inactivity.
(75) SSH daemon should be configured to:
- only listen on the required interfaces;
- have a login grace time of no more than 60 seconds;
- host-based authentication should be disabled;
- rhost-based authentication should be disabled;
- the ability to login directly as root should be disabled;
- empty passphrases should be disabled;
- connection forwarding should be disabled;
- gateway ports should be disabled; and
- X11 forwarding should be disabled.
(76) When using logins without a password for SSH connections, the following should be disabled:
- access from IP addresses that do not require access;
- port forwarding;
- agent credential forwarding;
- X11 display remoting; and
- console access.
Segregation of Duties
(77)
(78) The following controls should be implemented to restrict administrative and privileged accounts:
- limit the role of
System Administrator to the fewest number of individuals necessary to achieve adequate service; - implement granular permissions for the performance of privileged tasks;
- separate
System Administrator accounts from regular user accounts; - separate
System Administrator functions from audit and logging functions.System Administrators must not have the ability to modify or de-activate logs of their own activities.
Exemption for Specialty Devices
(79) Due to the wide variety of specialty devices and their frequently limited capabilities, particularly regarding passphrase management, specialty devices such as fax machines, printers, physical access control equipment, copy machines, specialty lab equipment, phones, etc. are not subject to these requirements unless those devices are used to store or protect Highly Restricted information as defined by the