IS3230 Access Control Proposal
Chris Wiginton
ITT Technical Institute, Tampa FL
Instructor: David Marquez
22 May, 2014
Proposal Statement
Integrated Distributors Incorporated (IDI) will establish specific requirements for protecting information and information systems against unauthorised access. IDI will effectively communicate the need for information and information system access control.
Purpose
Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of IDI which must be managed with care. All information has a value to IDI. However, not all of this information has an equal value or requires the same level
…show more content…
System access monitoring and logging - at a user level.
Role management so that functions can be performed without sharing passwords.
Password admin processes must be properly controlled, secure and auditable.
User Access Management
Formal user access control procedures must be documented, implemented and kept up to date for each application and information system to ensure authorised user access and to prevent unauthorised access. They must cover all stages of the lifecycle of user access, from the initial registration of new users to the final de-registration of users who no longer require access. These must be agreed by IDI. User access rights must be reviewed at regular intervals to ensure that the appropriate rights are still allocated. System administration accounts must only be provided to users that are required to perform system administration tasks.
User Registration
A request for access to IDI’s computer systems must first be submitted to the Information Services Helpdesk for approval. Applications for access must only be submitted if approval has been gained from Department Heads. When an employee leaves IDI, their access to computer systems and data must be suspended at the close of business on the employee’s last working day. It is the responsibility of the Department Head to request the suspension of the access rights via the Information Services Helpdesk.
User Responsibilities
It is a user’s
“New users are assigned access based on the content of an access request. The submitter must sign the request and indicate which systems the new user will need access to and what level of access will be needed. A manager’s approval is required to grant administrator level access.”
Maintain strict proper ID access control policies, standards, and guidelines. Implementation of second-level identification authorization testing procedures for sensitive applications, data and systems
Information assurance seeks to secure this information from unauthorized access or use. With our ever advancing technological environment, business are struggling to protect themselves and the information that customers have entrusted to them with occasional mis-steps serving as reminders that one can never be too careful.
When setting up user computers for employees, make sure that your technology department complies with the following restrictions:
Access controls must be rooted in good policies and procedures with strong tools to implement them. To ensure complete protection of resources access controls are split up into two different phases. The first phase is about forming a strong access control policy to layout the ground work for the rest of the organizations policies .This phase of access controls should at least address which subjects have access to varying degrees of sensitive systems and data, for what reason, and for how long. Authorization is the process that drives the operation of this phase. Policy enforcement is the next phase granting or rejecting access based on authorization of the policy definition phase. To guarantee enforcement of policies this phase is split up into three distinct operations: identification, authentication, and accountability.
The sole purpose of this report is to evaluate the current network and systems of IDI (Integrated Distributors Incorporated) outlining some of the risks and vulnerabilities of the network as well as providing recommendations for correcting deficiencies as well as strategies for mitigating said risks to the system. Because IDI has suffered network breaches which led to the disclosure of highly sensitive data in the past, it is necessary to ensure that further breaches do not occur in the future. This document will help in that department. The information IDI has and uses needs to remain confidential, unless the IDI feels the need to declassify said information. The information should not be deleted on a
When discussing the topic of information security there are many concepts, elements and topics to discuss. Some of the information to be discussed here are the ten domains of Computer Information Systems
Only the primary and backup Network Administrator can create new accounts. The Security Administrator, Human Resources (HR), and the Help Desk will be automatically notified by the system when new accounts are created. A third-party software will be used to notify the Security Administrator, the Network Administrator, and the Help Desk of account privilege escalation, changes to the membership of Administrator Groups, and account deletions. To improve auditing, generic administrator accounts are prohibited. Administrators must use their own user IDs to access information systems. Accounts that are not used for more than 30 days should be disabled automatically and reviewed
The importance of information security is to ensure confidentiality, integrity and availability of data. Information such as bank account statements, trade secrets, and personal information should be kept private and confidential. Protecting such information is a major part of information security.
According to Infosec Institute, an Information Security Policy (ISP) is a formal set of rules users and networks within organizational IT infrastructure must follow in order to insure security of information digitally stored within the organization (Kostadinov 2014). In order to implement an effective ISP, organization’s objectives must be taken into consideration, and a strategy for securing information, in line with formal regulations or accepted standards of good practice, must be developed (Bayuk 2009).
Access Controls provide a mechanism, which allows an administrator to ensure that appropriate techniques are in place to control how users interact with an IT system. It provides an avenue where restrictions can be developed, specifying what a user can do, the resources they can access, and the functions they can execute on a system. It is aligned with the three main security principles; confidentiality, integrity and availability. This alignment ensures that data and resources within an IT system will remain confidential as required, the structure will remain intact and these objects will remain available, so as not to diminish the functionality of the system. Access controls that are incorporated into a security plan are
Steady measures for arrange access and verification are basic to the organization's data security and are frequently required by directions or outsider assertions. Any client getting to the organization's PC frameworks can influence the security of all clients of the system. A fitting Network Access and Authentication Policy diminishes danger of a security episode by requiring reliable utilization of verification and access benchmarks over the system.
Access Management – Processes and technology to verify users’ identities and control access to resources Operational Design,
Information security refers to the process of protecting data or information from unauthorised use, access, disclosure, destruction or modification. The motive for having security over information is to maintain confidentiality, integrity and the timely and reliable availability of that data. This data or information is an asset and like any other important business assets, it is essential that it be properly protected.
Access Policy supervision, is the segment of access control that guarantees fine-grained and dependable approval of clients in light of tenets and parts. Access control strategy characterizes the errands that essential can perform and assets they can get to, and gives a review trail to consistence purposes. The establishment of a powerful get to control framework is the respectability of the working framework itself. In the event that the framework (equipment or programming) is traded off, noxious code can change applications and information without being identified, consequently rendering whatever is left of the security