(1) The (2) Access management ensures only those with a legitimate need can access our (3) Most (4) (5) This document provides the (6) This document applies to all (7) The primary audience for this document is (8) All persons accessing (9) Table 1 describes account types and their use. (10) Clauses 11 to 17 outline the access management controls for access management that should be applied to all (11) All decisions to grant, modify, or revoke a user’s access to (12) Access records should be retained for the life of the ICT Resource and in line with the Records Governance Policy to ensure access decisions can be traced. (13) Approval must be sought prior to granting, modifying, or revoking access as follows: (14) All users must acknowledge the (15) Access to (16) If a (17) All accounts provided to (18) Clauses 19 to 32 outline the technical controls that should be applied to all (19) Access to all (20) Unique identities cannot be reused. (21) Users must be authenticated using multifactor authentication (MFA) prior to being granted access (22) If MFA cannot be used, users must be authenticated by a long passphrase that the meets length and complexity requirements in Clause 45. (23) Where systems cannot support MFA, passphrases must be changed at least once every 365 days. If passphrase expiration cannot be enforced by the system, users must manually change their passphrase using the (24) Default, generic and shared accounts should not be used except for break-glass scenarios or cloud tenant administration. (25) Default and generic accounts should be renamed and disabled/removed (except for break-glass and cloud tenant administration). (26) The use of generic and shared accounts for break-glass scenarios and cloud tenant administration, must be attributable to an individual. (27) A separate privileged user account must be created for system administration. (28) Non-privileged activities must be performed using a standard user account. (29) Standard user accounts must not be used to run system services. (30) Service accounts must not be shared between applications or services, i.e., a separate account must be created for each application and service. (31) Standard users and administrators are not permitted to interactively log-in using service account credentials, except, as required to support or troubleshoot the specific service. (32) All access to (33) Passphrases must be issued using secure means. (34) First-use passphrases must be randomly generated. (35) Passphrases must be changed by a user upon first login. (36) Default passphrases on all systems, network resources, applications and databases must be immediately changed to a unique passphrase. (37) Unique passphrases must be used for each system. (38) Passphrases must not be shared i.e., known to more than one individual. (39) User identities must be verified prior to resetting passphrases. (40) The minimum age for passphrases should be 1 day or greater. (41) Passphrases used for single-factor authentication must be a list of random words, with a minimum length of 14 characters. (42) Passphrases should not contain any identification information or be the same as the last 10 passphrases. (43) MFA should require the use of a passphrase and a universal 2nd Factor security key, software based one-time passphrase token, physical one-time token, biometric authentication, or SMS. (44) Passphrases implemented as part of MFA must be at least 10 characters in length. (45) Passphrases for generic, default, shared, local administrator and service accounts must be at least 20 characters in length. (46) Passcodes for mobile phones must be at least 4 digits, or a biometric authentication with a passcode as a backup if the biometric fails. (47) Passphrases and passcodes must not be written down or stored in plain text. (48) If passphrase management software is used, the passphrase to access this software should be unique and meet the requirements of a local administrator/service account passphrase. (49) Cloud-based passphrase management software should be used with MFA. (50) If a passphrase has been shared with DTS for troubleshooting, the passphrase must be changed once the work is complete. (51) If an account or passphrase is suspected to have been compromised, the incident must be reported to the 17000 IT Service Desk and the passphrase must be changed immediately. (52) Credentials (i.e., the combination of username and passphrase) must be kept separate from the systems that they are used to authenticate to. (53) Credentials must be obscured as they are entered into systems to protect credentials from compromise. (54) Credentials stored on systems must be protected by a passphrase manager, a hardware security module, or by adopting methods such as salting, hashing, and stretching them before storage. (55) Windows Defender Credential Guard and Windows Defender Remote Credential Guard should be enabled where available to provide additional protection for credentials. (56) Privileged user accounts in Windows should be placed in a Protected Users security group where available. This security group will apply non-configurable protections to privileged user’s credentials. (57) Service accounts for Windows servers should be created as group Managed Service Accounts. This feature provides automated credential management and ensures service account credentials are long, unique, unpredictable, and managed. (58) Cached credentials should be limited to one previous logon to prevent the retrieval of cached credentials by an adversary. (59) The following controls should be implemented for (60) Email alerts should be sent to users when a login is detected from a new device. (61) Passphrases for break-glass accounts should be machine-generated and held in the (62) A break-glass procedure must be created by the (63) If a break-glass account is used, access to the account must be: (64) Passwords for break-glass accounts must be changed immediately after each time they are used. (65) User access, user queries, and user actions on databases should occur only through programmatic methods. Programmatic access refers to the use of a programming language to access a database, which provides more security than direct/manual access. (66) Only database administrators should be able to directly access or query databases. (67) Application IDs for database applications should only be used by the applications (and not by individual users or other non-application processes). (68) SNMP version 1 should not be used to monitor network devices as the protocol versions are insecure. (69) Default SNMP community strings on network devices should be changed and write access disabled. (70) SNMP community strings must meet the requirements of a local administrator/service account password. (71) SNMP community strings should be changed when someone leaves the University who would know or had used the password. (72) SSH version 1 should be disabled. Only SSH version 2 should be used. (73) Public key-based authentication should be used for SSH connections. (74) SSH private keys should be protected with a password or key encrypting key. (75) When SSH-agent or similar key caching programs are used, the program should be limited to workstations and servers with screen locks and key caches should expire within 4 hours of inactivity. (76) SSH daemon should be configured to: (77) When using logins without a password for SSH connections, the following should be disabled: (78) (79) The following controls should be implemented to restrict administrative and privileged accounts: (80) Due to the wide variety of specialty devices and their frequently limited capabilities, particularly regarding passphrase management, specialty devices such as fax machines, printers, physical access control equipment, copy machines, specialty lab equipment, phones, etc. are not subject to these requirements unless those devices are used to store or protect Highly Restricted information as defined by the Information Security Access Control Standard
Section 1 - Executive Summary
Section 2 - Purpose
Section 3 - Scope
Section 4 - Audience
Section 5 - Requirements
Types of Accounts
Type of Account
Description
Example
Standard user
Unique University-issued account assigned to
UniID, three letters and three number combination.
Privileged user (personal account)
Unique University-issued privileged account assigned to
Database, server, cloud, and domain administrator.
Local administrator
Privileged account that is created by default when an operating system is installed. The account sits outside the domain and has full control of the files, directories, services, and resources on the load device.
Default local user account on operating systems.
Service account or application account
An account used to run services and applications such as a file server, web server, e-mail server, etc., or used by applications to access databases and operating systems.
Init or inetd on Linux and Unix; LocalSystem, NetworkService on Windows; cloud service account.
Generic/shared administrative account
Generic privileged account that exists on most devices and software by default. These accounts holder ‘super user’ privileges and are often shared among
Windows administrator, local admin, UNIX root, Orale SYS, AWS Root account, Azure Global admin
Break glass account
Generic administrative account used for emergencies. These accounts usually provide the highest level of privilege. This account is only used for emergencies or to fix urgent problems.
Like generic/shared accounts.
Access Management
Technical Controls
Passphrases, Passcodes, and Multi-Factor Authentication
Credential Protection
Account Protection
Break-Glass Accounts
Database Access
Simple Network Management Protocol (SNMP) Community Name Requirements
Secure Shell (SSH) Keys
Segregation of Duties
Exemption for Specialty Devices
View Current
This is the current version of this document. To view historic versions, click the link in the document's navigation bar.