Designing a secure access control policy
Access Control Policy of an organization should ensure
i. Availability of resources on need to do and need to know basis.
ii. Authentication of process
iii. Authorization of process
iv. Integrity of process and information
v. Confidentiality of information
To achieve all or some of above we need to consider a lot of factors. Some of the factors which we must consider before devising our access control policies are:
- Nature of Business
Nature of business primarily decides our access control system. For a financial firm customer's data access will be the important criteria whereas for a marketing firm third party data collection and storage will be the important criteria.
- Asset / Process Sensitivity & Criticality
A sensitive information or asset needs more protection than relatively less sensitive information or assets. Our policy should document the assets based on sensitivity and criticality. These classifications can be done in many ways depending upon the type of assets /information. for example - critical, sensitive, major, minor, public, confidential etc. This asset classification is most important and generally done in the beginning of Access policy development. This classification can be done on the basis of risk analysis and Business Impact Analysis.
Note: information itself is an asset.
- Ownership and Usage of assets
Asset access is largely done on the need to know and need to do basis.
- Segregation of duties
Segregation of duties play important role in designing Access control Policy. For example a database administrator can not be a programmer. So, a programmer should not be given any access to live data.
- Degree of outsourcing
A clear third party access control policy should be prepared by management before outsourcing any job.
Essential component of a good access control policy:
A good access control system should have one or more of the following components:
- Access Control Matrices
- Password/PIN/User ID rules
- Shared User ID rules ( if any) and justification
- Biometric Access rules
- Asset Classification
- Privileges, Roles and Profile description
- Authentication and Authorization rules
- Operating System and Database access rule
- Source code and executables access rules
- Network access rules
- Change management procedures
- Third party access procedures
0 comments:
Post a Comment