11. Access Control

Control objective: to control access to information

PDF 11.1 Business Requirement For Access Control

    11.1.1 Access control policy

    An access control policy has been established, documented in DOC 11.1, and is reviewed when required in the light of business and security needs. In addition, as the Trust Centre protects National Assets, the following are the physical procedures that must be followed every time the Trust Centre in the National Smart Card Centre in Isa Town is accessed.

    Administration Area

    When access is required to the Administration Area of the Trust Centre, any two of following five members are required in addition to one of the Police Officers, tasked by Mohammed Hamdan Mohammed, to guard the Trust Centre must supervise their entry, and wait in attendance directly outside the door of the Administration Area until all the people that entered, exit at the same time. No one is ever permitted to enter the Trust Centre Administration Area alone, under any conditions. And no one is permitted to remain in the Trust Centre Administration Area unaccompanied by one of the following personnel:

    If any of the above personnel are absent they can be represented/replaced by the Director General of IT, or the President of the CIO.

    Outer Core

    When access is required to the Outer Core Area of the Trust Centre, all three of following members are required in addition to one of the Police Officers, tasked by Mohammed Hamdan Mohammed, to guard the Trust Centre must supervise their entry, and wait in attendance directly outside the door of the Outer Area until all the people that entered, exit at the same time. No one is ever permitted to enter the Trust Centre Administration Area alone, under any conditions. And no one is permitted to remain in the Trust Centre Outer Core Area unaccompanied by all of the following personnel:

    If any of the above personnel are absent they can be represented/replaced by the Director General of IT, or the President of the CIO.

    Inner Core
    When access is required to the Inner Core Area of the Trust Centre, all three of following members are required in addition to one of the Police Officers, tasked by Mohammed Hamdan Mohammed, to guard the Trust Centre must supervise their entry, and wait in attendance directly outside the door of the Outer Area until all the people that entered, exit at the same time. No one is ever permitted to enter the Trust Centre Administration Area alone, under any conditions. And no one is permitted to remain in the Trust Centre Inner Core Area unaccompanied by all of the following personnel:

    If any of the above personnel are absent they can be represented/replaced by the Director General of IT, or the President of the CIO.

    Setting Access Control on the Idendix System

    Access to all areas of the Trust Centre is controlled by the Identix biometric locking system on all of the doors. The system is configured according to the policy set out in sub section 11.1 above. Only two people have the username and password to access this system:

    The Identix control system is located in the Administration Area of the Trust Centre and as no one can access this area alone, both people will be monitored by one of the other personnel with access rights to the Administration Area. A change log must be signed by the Director General of IT or the President of the CIO to change the access configuration for any of the doors in the Trust Centre.

    No changes to this system are permitted without this change control document signed by the Director General of IT or the President of the CIO.

    In addition, as part of the monthly controls checking procedure, the Information Security Manager will check the los on the Identix system, print out these logs and sign them to demonstrate that no unauthorised changes have occurred without authorisation.


11.2 User Access Management

Control objective: to ensure authorized users’ access and to prevent unauthorised access to information systems

    11.2.1 User registration
    There is a formal user registration and de-registration procedure (DOC 11.3 and DOC 11.4) for granting and revoking access to all information systems and services

    11.2.2 Privilege management
    The allocation and use of privileges is restricted and controlled in DOC 11.3

    11.2.3 User password management
    The allocation of passwords is controlled through a formal management process as set out in DOC 11.3

    11.2.4 Review of user access rights

    Management reviews users’ access rights at regular intervals using the formal process as set out in DOC 11.3


11.3 User Responsibilities

Control objective: to prevent unauthorized user access, and compromise or theft of information and information processing facilities

    11.3.1 Password use

    Users are required (in their User Agreements DOC 11.4) to follow good security practices in the selection and use of passwords

    11.3.2 Unattended user equipment

    Users are required (in their User Agreements DOC 11.4) to ensure that unattended equipment has appropriate protection

    11.3.3 Clear desk and screen policy

    The Organisation has adopted a clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities and the requirement for compliance with this policy is set out in DOC 11.4.


11.4 Network Access Control

Control objective: to prevent unauthorized access to networked services

    11.4.1 Policy on use of network services
    The Organisation’s policy (in DOC 11.7) is that users are only provided with access to the services that they have been specifically authorized to use.

    11.4.2 User authentication for external connections

    DOC 11.8 sets out the authentication methods that are used to control access by remote users.

    11.4.3 Equipment identification in the network

    Automatic equipment identification is used as set out in DOC 11.8 as a means to authenticate connections from specific locations and equipment

    11.4.4 Remote diagnostic and configuration port protection

    Physical and logical access to diagnostic and configuration ports is controlled as required by DOC 11.8.

    11.4.5 Segregation in networks

    Groups of information services, users and information systems are segregated in the network(s) in line with the requirements of DOC 11.7 and 11.8

    11.4.6 Network connection control

    The Organization has a single shared network which extends across the organizational boundaries; the Organization restricts the capability of users to connect to the network, in line with the access control policy (DOC 11.1) and requirements of the business applications and as set out in DOC 11.8.

    11.4.7 Network routing control

    Routing controls have been implemented in line with DOC 11.8 for the Organization networks to ensure that computer connections and information flows do not breach the Organization access control policy as applied to the business applications


11.5 Operating System Access Control

Control objective: to prevent unauthorized access to operating systems

    11.5.1 Secure log-on procedure

    Access to information systems is controlled by the secure log-on procedure set out in DOC 11.9

    11.5.2 User identification and authentication

    All users have a unique identifier (user ID) for their personal and sole use, issued in line with the requirements of DOC 11.3, and [a suitable authentication technique] has been chosen to substantiate the claimed identity of a user

    11.5.3 Password management system

    The password management system set out in DOC 11.3 ensures quality passwords

    11.5.4 Use of system utilities

    The use of utility programs that might be capable of overriding system and application controls is restricted and controlled as specified in DOC 11.10.

    11.5.5 Session time-out

    Inactive sessions are shut down in accordance with DOC 11.9 after a defined period of inactivity

    11.5.6 Limitation of connection time

    Restrictions on connection times are used to provide additional security for high-risk applications, as specified in DOC 11.8.


11.6 Application & Information Access Control

Control objective: to prevent unauthorized access to information held in application systems

    11.6.1 Information access restriction

    Access to information and application system functions by users and support personnel is restricted in DOC 11.2 in accordance with the access control policy in DOC 11.1

    11.6.2 Sensitive system isolation

    Sensitive systems have a dedicated (isolated) computing environment as provided in DOC 11.9


11.7 Mobile Computing & Teleworking

Control objective: to ensure information security when using mobile computing and teleworking facilities

    11.7.1 Mobile computing and communications

    A formal policy is in place and appropriate security measures have been adopted to protect against the risks of using mobile computing and communication facilities

      11.7.1.1 The Organization’s mobile computing policy below covers notebook computers, palmtops, (PDAs), laptops, smart phones and mobile phones. The Organization provides mobile computing facilities in order to improve the productivity, flexibility, responsiveness and effectiveness of its operations. The Organization also takes appropriate steps for physical protection (User Agreement DOC 11.4), access controls, cryptography, backups and malware protection for mobile devices and also ensures that users receive appropriate training before they are issued with mobile devices. Users are required to accept in writing (DOC 11.5 and 11.6) specific responsibilities with regard to backups, malware protection and their use of mobile devices, particularly with regard to working in unprotected environments.

    11.7.2 Teleworking

    Is not permitted in the Trust Centre.

    Adlin Hisyamuddin
    Information Security Manager

    ____________________________

    On:

    08 November, 2007
    ____________________________

    Change history

    Issue 1 08 November, 2007 Initial issue