22.3 Account Management
a) All internal, external and temporary users and their activity on IT systems must be uniquely identifiable. Enable user identities via authentication mechanisms.
b) User access rights to systems and data are to be in line with defined and documented business needs and that job requirements are attached to user identities.
c) User access rights are to be requested through user access management, approved by system owners and implemented by the security-responsible person.
d) Maintain user identities and access rights in a central repository. Deploy cost-effective technical and procedural measures, and keep them current to establish user identification, implement authentication and enforce access rights.
e) Define and document the process of requesting, establishing, issuing, suspending, modifying and closing user accounts and related user privileges with a set of user account management procedures. Include an approval procedure outlining the data or system owner granting access privileges. These procedures should apply for all users, including administrators (privileged users) and internal and external users, for normal and emergency cases.
f) Rights and obligations relative to access to enterprise systems and information should be contractually arranged for all types of users.
g) Regular management review of all accounts and related privileges must be performed.
22.3 Account Management
a) All internal, external and temporary users and their activity on IT systems must be uniquely identifiable. Enable user identities via authentication mechanisms.
b) User access rights to systems and data are to be in line with defined and documented business needs and that job requirements are attached to user identities.
c) User access rights are to be requested through user access management, approved by system owners and implemented by the security-responsible person.
d) Maintain user identities and access rights in a central repository. Deploy cost-effective technical and procedural measures, and keep them current to establish user identification, implement authentication and enforce access rights.
e) Define and document the process of requesting, establishing, issuing, suspending, modifying and closing user accounts and related user privileges with a set of user account management procedures. Include an approval procedure outlining the data or system owner granting access privileges. These procedures should apply for all users, including administrators (privileged users) and internal and external users, for normal and emergency cases.
f) Rights and obligations relative to access to enterprise systems and information should be contractually arranged for all types of users.
g) Regular management review of all accounts and related privileges must be performed.
การแปล กรุณารอสักครู่..