Passwords | Schedule for password changes. |
| Process for controlling
minimum password length and expiration periods. |
| Schedule for system password
changes. |
Accounts | Procedure to grant accounts
on computer systems, for example, statement of need, signature of
requester, requester's manager, system manager, or person setting
up the account. (Accounts can never be shared.) |
| Procedure to deactivate
accounts due to organizational changes, for example, employee transfers
or terminations. |
| Timetable for reauthorizing
accounts, usually once every 6 to 12 months. |
| Directive to deactivate
accounts that are not used on a regular basis. |
| Time periods for access. |
| Timetable for expiring accounts. |
| Procedure for requesting
privileges that rigorously controls allocation. |
| Requirement to use nonprivileged
accounts for privileged users performing normal system activity. |
| Schedule for verifying inactive
accounts. |
| List of approved security
tools. |
Security events
to audit | Logins from selected or
all sources. |
| Changes to authorization
file records. |
| Other uses of privilege
and system management actions. |
| Modifications to the known
file list through the Install utility. |
| Modification to the network
configuration database, using the network control program (NCP). |
Physical access
to the computer room | A written list of authorized
personnel with the reason for access included. Typically, one person
would be responsible for keeping this list current. |
| Storage of a visitor log
in a secure area. |
| Locked access doors and
a documented procedure for assigning keys, key cards, and combinations.
(These access controls change periodically and on transfer or termination
of employees.) |
Physical access
to terminals and personal computers located outside the computer
room | Use of programs to log out
terminals that have not been used for a given period of time. |
| Security awareness programs
for the organization (beyond computer personnel); topics may include: Maintaining a list of approved software. Keeping desktops clear of hardcopy information relating
to the computer system, network passwords, and other system account
information. Locking disks and file cabinets. Keeping diskettes inaccessible in or near workstations. Keeping keys out of open view.
|
Dialup numbers | List of authorized users. |
| Schedule for changing numbers
periodically and procedures for notifying users of number changes. |
| A policy to minimize publishing
dialup numbers. |
| Policy about changing passwords
periodically and when employees with access are terminated. |
| Password protection, either
in the modems or terminal servers, or system passwords on host dialup
ports. |
| Documentation available
about: Details about the network Terminal equipment installed Terminal switching systems Details about all terminal devices connected to
the network Details about all dialup equipment
|
Communications | Denial of access into privileged
accounts if using passwords over TCP/IP, LAT, or Ethernet links. |
| Use of authentication cards for network
logins into privileged accounts. |