22.7 Super user and Privilege ID Management
a) No super user ID password held in the custody of a single person. The passwords must be split into two and held by separate independent custodians. These passwords must be lodge in a safe under dual control
b) System root ID and password must not be set to expired
c) Usage of super user IDs and passwords must be minimal and with proper authorization. It must be used at physically secured area.
d) Any special super-user IDs granted to users on technical platforms must be based upon job function and need to have basis. (e.g. administration user-IDs for operating systems, databases or applications, or accounts that can override system or application controls)
e) Inappropriate use of the system privileges is often found to be a major contributory factor to the failure of systems which security has been breached.
f) The privileges associated with each system, e.g. operating system, database and other applications, network resources and the categories of users to which these privileges need to be allocated are to be identified and closely monitored.
g) Individuals assigned with powerful/super-user or equivalent privileges are to use a different user identity (if the system permits) for normal operational use, in case they require such access.
h) Privileges for a single person across various systems e.g. banking application, OS Network resources, and database systems need to be discouraged. This is to enable segregation of duty.
i) Passwords for super user are to be kept in a sealed envelope and lodged with an authorized person for use in event of emergency. It must be ensured that only authorized employee is allowed to access this password, in the event that the administrator cannot be reached during an emergency.
j) Backup copies of passwords for super user IDs must be lodged and kept secured.
k) In the event the “super-user” access to the system is terminated or has resigned, the password for the super-user must be changed on the same day.
l) All super user or privilege ID activities audit log must be reviewed to ensure valid activities were