SlideShare a Scribd company logo
Sample Access Control Policy
1. Purpose
2. Scope
3. Policy
Access control policy
Who and how is authorisation for access to systems and
business applications granted?User access
How is access to information systems to be granted (eg
passwords etc)?
Who is responsible for monitoring and reviewing access rights?
Who is responsible for removing and notifying of redundant
User IDs and accounts and what is the process?
Who is responsible for granting access to systems utilities and
privilege management?
How is access and use of systems utilities monitored?User
responsibilities
How are users to be educated and made aware of access
responsibilities?
What are users’ responsibilities for access and
passwords?Network access
Who is responsible for authorising network access (both
internally and external connections)?
What is the process for enforced network paths, user
authentication for external connection, Node authentication, use
of remote diagnostic ports?
How will network domains and groups be segregated?
What network connection controls will be in place – eg. times,
type and size of file transfers to external source?Operating
system access
How is automatic terminal identification used to authenticate
connections to specific locations and portable equipment?
What is the secure logon and logoff process for access?
Are there restrictions on connection times in place?
How will passwords be issued and managed – what are the rules
for passwords?
How will systems utilities’ use be controlled? Application
access
Who authorises application access eg read, write?
What is the process for authorising access to information when
systems share resources, eg. two separate systems are integrated
to form a third application or system?Monitoring system access
What system events will be logged, eg. date, IP address, User-
IDs, unsuccessful logins, alerts from intrusion detection systems
(firewall)?
When and who will review and monitor system logs? And where
are they stored?Mobile computing and telecommuting
Outline Agency policy for each type of mobile device – eg.
physical storage, personal usage, protection of information held
on the device, access mechanisms (eg password), virus
protection, backup.
Policy on use of computer equipment for telecommuting, eg.
authorisation process, system access, physical security, etc.
Template - Access Control Policy Page 1 of 2 June 06

More Related Content

PPTX
Security Policy
PPTX
Domain 5 - Identity and Access Management
PDF
Ch06 Policy
PDF
Access Control Policy – Sample Framework for Secure Access
PPTX
Building The Framework For A Culture Of Security
PPTX
Network Security Policies
PDF
Remote Access Policy Is A Normal Thing
PPTX
Cyber Security unit-4.pptx for computers
Security Policy
Domain 5 - Identity and Access Management
Ch06 Policy
Access Control Policy – Sample Framework for Secure Access
Building The Framework For A Culture Of Security
Network Security Policies
Remote Access Policy Is A Normal Thing
Cyber Security unit-4.pptx for computers

Similar to Sample Access Control Policy1.Purpose2.Scope3.Pol.docx (20)

DOCX
 IT Infrastructure PoliciesLearning Objectives and Outcome
PDF
For our discussion question, we focus on recent trends in security t.pdf
DOCX
Security policy case study
PDF
IT Network Security Policy
PPT
Operations_Security - Richard Mosher
PPTX
Security Management | System Administration
PDF
Barbed Wire Network Security Policy 27 June 2005 7
PDF
IC-ISO-27001-Checklist-10838_PDF.pdf
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
DOCX
Learning Objectives and OutcomesExamine IT infrastructure poli.docx
DOCX
Learning Objectives and OutcomesExamine IT infrastructure po.docx
PPTX
HIPAA Safeguard Slides
PPTX
12 security policies
PPT
Information Security Policies and Standards
PPT
2. access control
PDF
File000169
PDF
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
PDF
Information security policy how to writing
PPT
Net essentials6e ch10
 IT Infrastructure PoliciesLearning Objectives and Outcome
For our discussion question, we focus on recent trends in security t.pdf
Security policy case study
IT Network Security Policy
Operations_Security - Richard Mosher
Security Management | System Administration
Barbed Wire Network Security Policy 27 June 2005 7
IC-ISO-27001-Checklist-10838_PDF.pdf
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
Learning Objectives and OutcomesExamine IT infrastructure poli.docx
Learning Objectives and OutcomesExamine IT infrastructure po.docx
HIPAA Safeguard Slides
12 security policies
Information Security Policies and Standards
2. access control
File000169
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
Information security policy how to writing
Net essentials6e ch10

More from agnesdcarey33086 (20)

DOCX
Sample Summaries of Emily Raine’s Why Should I Be Nice to You.docx
DOCX
SAMPLEExecutive Summary The following report is an evalua.docx
DOCX
Sample Student Industry AnalysisExecutive SummaryCom.docx
DOCX
sample.sql-- START-- SETUP Create userCREATE USER .docx
DOCX
SAMPLING MEAN DEFINITION The term sampling mean is.docx
DOCX
SAMPLING MEANDEFINITIONThe term sampling mean is a stati.docx
DOCX
sampleReportt.docxPower Electronics Contents.docx
DOCX
Sample Workflow of Answering a Telephone in an OfficeInform .docx
DOCX
Sample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docx
DOCX
SAMPLE Project (Answers and explanations are in red)I opened t.docx
DOCX
Sample Questions to Ask During an Informational Interview .docx
DOCX
Sample Table.pdfTopic RatingPatients Goal Able to walk .docx
DOCX
SAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docx
DOCX
Sample PowerPoint Flow Week 5Select a current product with which.docx
DOCX
Sample Of assignmentIntroductionComment by Jane Summers Introd.docx
DOCX
SAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docx
DOCX
Sample Action Research Report 1 Effect of Technol.docx
DOCX
Sample Case with a report Dawit Zerom, Instructor Cas.docx
DOCX
Salkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docx
DOCX
Sales_Marketing_-_Riordan_9.docxSales & MarketingHome .docx
Sample Summaries of Emily Raine’s Why Should I Be Nice to You.docx
SAMPLEExecutive Summary The following report is an evalua.docx
Sample Student Industry AnalysisExecutive SummaryCom.docx
sample.sql-- START-- SETUP Create userCREATE USER .docx
SAMPLING MEAN DEFINITION The term sampling mean is.docx
SAMPLING MEANDEFINITIONThe term sampling mean is a stati.docx
sampleReportt.docxPower Electronics Contents.docx
Sample Workflow of Answering a Telephone in an OfficeInform .docx
Sample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docx
SAMPLE Project (Answers and explanations are in red)I opened t.docx
Sample Questions to Ask During an Informational Interview .docx
Sample Table.pdfTopic RatingPatients Goal Able to walk .docx
SAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docx
Sample PowerPoint Flow Week 5Select a current product with which.docx
Sample Of assignmentIntroductionComment by Jane Summers Introd.docx
SAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docx
Sample Action Research Report 1 Effect of Technol.docx
Sample Case with a report Dawit Zerom, Instructor Cas.docx
Salkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docx
Sales_Marketing_-_Riordan_9.docxSales & MarketingHome .docx

Recently uploaded (20)

PDF
01-Introduction-to-Information-Management.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Cell Types and Its function , kingdom of life
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
RMMM.pdf make it easy to upload and study
PPTX
Pharma ospi slides which help in ospi learning
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
master seminar digital applications in india
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
01-Introduction-to-Information-Management.pdf
GDM (1) (1).pptx small presentation for students
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
human mycosis Human fungal infections are called human mycosis..pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
Sports Quiz easy sports quiz sports quiz
Cell Types and Its function , kingdom of life
O5-L3 Freight Transport Ops (International) V1.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Pharmacology of Heart Failure /Pharmacotherapy of CHF
RMMM.pdf make it easy to upload and study
Pharma ospi slides which help in ospi learning
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Computing-Curriculum for Schools in Ghana
Supply Chain Operations Speaking Notes -ICLT Program
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
master seminar digital applications in india
TR - Agricultural Crops Production NC III.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES

Sample Access Control Policy1.Purpose2.Scope3.Pol.docx

  • 1. Sample Access Control Policy 1. Purpose 2. Scope 3. Policy Access control policy Who and how is authorisation for access to systems and business applications granted?User access How is access to information systems to be granted (eg passwords etc)? Who is responsible for monitoring and reviewing access rights? Who is responsible for removing and notifying of redundant User IDs and accounts and what is the process? Who is responsible for granting access to systems utilities and privilege management? How is access and use of systems utilities monitored?User responsibilities How are users to be educated and made aware of access responsibilities? What are users’ responsibilities for access and passwords?Network access Who is responsible for authorising network access (both internally and external connections)? What is the process for enforced network paths, user authentication for external connection, Node authentication, use of remote diagnostic ports? How will network domains and groups be segregated? What network connection controls will be in place – eg. times, type and size of file transfers to external source?Operating system access How is automatic terminal identification used to authenticate
  • 2. connections to specific locations and portable equipment? What is the secure logon and logoff process for access? Are there restrictions on connection times in place? How will passwords be issued and managed – what are the rules for passwords? How will systems utilities’ use be controlled? Application access Who authorises application access eg read, write? What is the process for authorising access to information when systems share resources, eg. two separate systems are integrated to form a third application or system?Monitoring system access What system events will be logged, eg. date, IP address, User- IDs, unsuccessful logins, alerts from intrusion detection systems (firewall)? When and who will review and monitor system logs? And where are they stored?Mobile computing and telecommuting Outline Agency policy for each type of mobile device – eg. physical storage, personal usage, protection of information held on the device, access mechanisms (eg password), virus protection, backup. Policy on use of computer equipment for telecommuting, eg. authorisation process, system access, physical security, etc. Template - Access Control Policy Page 1 of 2 June 06