This is the body of the policy where you state all policy requirements.
1. Principles
The company shall provide all employees and contracted third parties with access to the information they need to carry out their responsibilities as effectively and efficiently as possible.
2. General
- Each user shall be identified by a unique user ID so that individuals can be held accountable for their actions.
- The use of shared identities is permitted only where they are suitable, such as training accounts or service accounts.
- Each user shall read this data security policy and the login and logoff guidelines and sign a statement that they understand the conditions of access.
- Records of user access may be used to provide evidence for security incident investigations.
- Access shall be granted based on the principle of least privilege, which means that each program and user will be granted the fewest privileges necessary to complete their tasks.
3. Access Control Authorization
- Access to company IT resources and services will be given through the provision of a unique user account and complex password. Accounts are provided by the IT department based on records in the HR department.
- Passwords are managed by the IT Service Desk. Requirements for password length, complexity and expiration are stated in the company password policy.
- Role-based access control (RBAC) will be used to secure access to all file-based resources in Active Directory domains.
4. Network Access
- All employees and contractors shall be given network access in accordance with business access control procedures and the least-privilege principle.
- All staff and contractors who have remote access to company networks shall be authenticated using the VPN authentication mechanism only.
- Segregation of networks shall be implemented as recommended by the company's network security research. Network administrators shall group together information services, users and information systems as appropriate to achieve the required segregation.
- Network routing controls shall be implemented to support the access control policy.
5. User Responsibilities
- All users must lock their screens whenever they leave their desks to reduce the risk of unauthorized access.
- All users must keep their workplace clear of any sensitive or confidential information when they leave.
- All users must keep their passwords confidential and not share them.
6. Application and Information Access
- All company staff and contractors shall be granted access to the data and applications required for their job roles.
- All company staff and contractors shall access sensitive data and systems only if there is a business need to do so and they have approval from higher management.
- Sensitive systems shall be physically or logically isolated in order to restrict access to authorized personnel only.
7. Access to Confidential, Restricted information
Access to data classified as ‘Confidential’ or ‘Restricted’ shall be limited to authorized persons whose job responsibilities require it, as determined by the Data Security Policy or higher management.
The responsibility to implement access restrictions lies with the IT Security department.
8. Technical Guidelines
The technical guidelines specify all requirements for technical controls used to grant access to data. Here is an example:
· Access control methods to be used shall include:
- Auditing of attempts to log on to any device on the company network
- Windows NTFS permissions to files and folders
- Role-based access model
- Server access rights
- Firewall permissions
- Network zone and VLAN ACLs
- Web authentication rights
- Database access rights and ACLs
- Encryption at rest and in flight
- Network segregation
· Access control applies to all networks, servers, workstations, laptops, mobile devices, web applications and websites, cloud storages, and services.
9. Reporting Requirements
This section describes the requirements for reporting incidents that happen.
- Daily incident reports shall be produced and handled within the IT Security department or the incident response team.
- Weekly reports detailing all incidents shall be produced by the IT Security department and sent to the IT manager or director.
- High-priority incidents discovered by the IT Security department shall be immediately escalated; the IT manager should be contacted as soon as possible.
- The IT Security department shall also produce a monthly report showing the number of IT security incidents and the percentage that were resolved.
10. Ownership and Responsibilities
- Here you should state who owns what and who is responsible for which actions and controls.
- Data owners are employees who have primary responsibility for maintaining information that they own, such as an executive, department manager or team leader.
- Information Security Administrator is an employee designated by the IT management who provides administrative support for the implementation, oversight and coordination of security procedures and systems with respect to specific information resources.
- Users include everyone who has access to information resources, such as employees, trustees, contractors, consultants, temporary employees and volunteers.
- The Incident Response Team shall be chaired by an executive and include employees from departments such as IT Infrastructure, IT Application Security, Legal, Financial Services and Human Resources.
11. Enforcement
This paragraph should state the penalties for access control violations.
Any user found in violation of this policy is subject to disciplinary action, up to and including termination of employment. Any third-party partner or contractor found in violation may have their network connection terminated.
12. Definitions
This paragraph defines any technical terms used in this policy.
- Access control list (ACL) — A list of access control entries (ACEs) or rules. Each ACE in an ACL identifies a trustee and specifies the access rights allowed, denied or audited for that trustee.
- Database — An organized collection of data, generally stored and accessed electronically from a computer system.
- Encryption—The process of encoding a message or other information so that only authorized parties can access it.
- Firewall — A technology used for isolating one network from another. Firewalls can be standalone systems or can be included in other devices, such as routers or servers.
- Network segregation — The separation of the network into logical or functional units called zones. For example, you might have a zone for sales, a zone for technical support and another zone for research, each of which has different technical needs.
- Role-based access control (RBAC) — A policy-neutral access-control mechanism defined around roles and privileges.
- Server — A computer program or a device that provides functionality for other programs or devices, called clients.
- Virtual private network (VPN) — A secure private network connection across a public network.
- VLAN (virtual LAN) — A logical grouping of devices in the same broadcast domain.
13. Related Documents
This section lists all documents related to the policy and provides links to them. This list might include:
- Data Classification Policy
- Password Policy
- Data Loss Protection Policy
- Encryption Policy
- Incident Response Policy
- Workstation Security Policy
- Data Processing Agreement
14. Revision History
Every policy revision should be recorded in this section.
*IMPORTANT NOTE: English shall be the language of this Policy and the parties waive any right to use and rely upon any other language or translation.