Identity and Access Management
The roles and responsibilities related to identity and access management are defined for Corporate Security, System Administrator, System Owners and End Users in the Identity and Access Management Standard.
Security requirements for end user accounts, privileged user accounts, break-glass user accounts and service/application accounts are also established, including aspects such as account differentiation, uniqueness, traceability, validity, access rights, lockout policy, deactivation and deletion.
Access to corporate resources is only allowed via encrypted communication channels with multi-factor authentication. It also lists the accepted authentication methods, such as password, PIN and biometric factors. The security requirements for password and PIN creation, complexity, expiration and history are defined.
Access rights management processes are guided by the "need to know" and "least privilege" principles.
Privileged accounts and access rights go through a formal request and approval process.
All accounts and access rights are reviewed at least annually to determine if they are still needed or not.
Last updated
Was this helpful?