1. Objective
To control and regulate access to Integra IT systems, to monitor and manage to ensure the security of systems and data.
2. Scope
This is applicable to all systems owned, managed and operated by Integra, and all staff and users including administrator of these systems.
3. Reference
Standards: ISO 27001:2022 Information Security Management System
Controls: A 5.16, A 5.18, A 5.17, A 8.2 , A 8.18
Definition
Integra is committed in implementing a comprehensive user access and privilege management program. This responsibility is delegated to the following groups and individuals.
4. General Principles
5.1 System Administration
The system administration is responsible for:
Process to follow before handing over Laptops:
5.2 Information Security Management Group(ISMG)
The ISMG is responsible for:
5.3 User
The users are responsible for:
5.4 User Access and Privilege Management
5.4.1 Privilege Management
System access, application access and associated privileges must be restricted and only provided to users with a legitimate business need via an approved formal authorization process.
The authorization process for privilege allocation must record all access provided and the relevant authorizer. Privileges must only be granted once the appropriate authorization has been granted. Privileges should be allocated to users based upon their role-based requirements on a system by system basis.
Request for system access, privilege allocation should be placed through written communication via emails, by department head to IT.
System administrative privilege or other escalated privileges, not required for routine business use, should be allocated to a separate but still individual user profile, to be used for escalated privilege functions only.
5.4.2 Application Access Control
Access to applications and the level of privilege within applications must be strictly controlled to protect the confidentiality, integrity, and availability of the application and its data.
Application systems must ensure that users cannot surpass system controls by utilizing the application system or its related information and gain access to data or systems to which they have not been provided authorized access.
Application systems should provide granular access for users to ensure the principle of least privilege is maintained - users only can access those items that they have a need to access.
Application documentation should be targeted for the type of user accessing the system and should avoid providing un-required information.
Applications have a default session time out of 30 min set to ensure that user has to re-login in the event that the system is left unattended for the said time duration.
Highly sensitive systems may need to be isolated from the standard network. Such investigations should be performed by system administrator in periodic intervals.
5.4.3 Administrative Access Accounts
Administrative access privileges must not be granted to standard user accounts; instead a separate account should be used for administrative privileges.
Generally, there should not be more than two people with administrative access to a system.
5.4.4 Remote Users
The “Work from Home” (WFH) users will have to make sure that they are not connecting company devices to unsecured network. All these users must follow the Password Policy and Acceptable Asset Usage Policy.
5.4.5 Password Controls
Password controls must be managed in accordance with the Password policy for Integra.
5.4.6 Monitoring of System Access and Use
Monitoring of System access and use must be managed in accordance with the systems management policy.
5.4.7 Review of User Access Rights
User access rights must be reviewed once in a month on a regular basis. Privileged system and application access must be reviewed once in month on a regular basis.
Any access no longer required must be removed. Request for access and privilege removal should be placed through written communication via emails, by department head to IT.
5.4.8 Use of System Utilities
Only system administrator is permitted to use system utilities that are capable of overriding system and application controls.