LOGICAL ACCESS CONTROL POLICIES Clause Samples

LOGICAL ACCESS CONTROL POLICIES. 4.1 Abstract The logical access control consists of four pillars: These are identification, authentication, authorization, and last but not least monitoring. Authorization is based on a person identified by a user ID well authenticated, whom are granted the system privileges and / or the access rules necessary to perform her / his task. In terms of baseline controls, authentication by password can be considered as a good minimum security level, provided the management of the user IDs, password and authorization are compliant with the policies presented below. By ensuring that only an involved end user knows his or her own password, it permits system activity logged with a corresponding personal user ID to be uniquely attributable to a certain user. The information owner is responsible for validating access requests to her or his applications and data. The hereafter policies are structured based on the four access control pillars: 1. Identification 2. Authentication 3. Authorization 4. Monitoring

Related to LOGICAL ACCESS CONTROL POLICIES

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data. b. User Access - DST shall have a process to promptly disable access to Fund Data by any DST personnel who no longer requires such access. DST will also promptly remove access of Fund personnel upon receipt of notification from Fund.