System Access Control Sample Clauses

The System Access Control clause defines the rules and requirements for granting, managing, and restricting access to a particular system or network. Typically, it outlines who is authorized to access the system, the procedures for assigning user credentials, and the security measures in place to prevent unauthorized entry, such as password policies or multi-factor authentication. This clause is essential for protecting sensitive data and ensuring that only approved individuals can interact with critical systems, thereby reducing the risk of data breaches and maintaining operational security.
POPULAR SAMPLE Copied 3 times
System Access Control. Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.
System Access Control. Automated Audit Trail
System Access Control. (Access Control (AC) Family, NIST SP 800-53 rev. 4) 1. Upon hiring or before granting access to SSA-provided information, EIEPs should verify the identities of any employees, contractors, and agents who will have access to SSA-provided information in accordance with the applicable agency or state’s “personnel identity verification policy.” 2. SSA requires that state agencies have a logical control feature that designates a maximum number of unsuccessful login attempts for agency workstations and devices that store or process SSA-provided information, in accordance with NIST guidelines. SSA recommends no fewer than three (3) and no greater than five (5).. 3. SSA requires that the state agency designate specific official(s) or functional component(s) to issue PINs, passwords, biometric identifiers, or Personal Identity Verification (PIV) credentials to individuals who will access SSA-provided information. SSA also requires that the state agency prohibit any functional component(s) or official(s) from issuing credentials or access authority to themselves or other individuals within their job- function or category of access. 4. SSA requires that EIEPs grant access to SSA-provided information based on least privilege, need-to-know, and separation of duties. State agencies should not routinely grant employees, contractors, or agents access privileges that exceed the organization’s business needs. SSA also requires that EIEPs periodically review employees, contractors, and agent’s system access to determine if the same levels and types of access remain applicable. 5. If an EIEP employee, contractor, or agent is subject to an adverse administrative action by the EIEP (e.g., reduction in pay, disciplinary action, termination of employment), SSA recommends the EIEP remove his or her access to SSA-provided information in advance of the adverse action to reduce the possibility that will the employee will perform unauthorized activities that involve SSA- provided information. 6. SSA requires that work-at-home, remote access, and/or Internet access comply with applicable Federal and state security policy and standards. Furthermore, the EIEPs access control policy must define the safeguards in place to adequately protect SSA-provided information for work-at-home, remote access, and/or Internet access. 7. SSA requires EIEPs to design their system with logical control(s) that prevent unauthorized browsing of SSA-provided information. SSA refers to this setup as a Permissio...
System Access Control. Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy. • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has policies designed to provide that no rights are granted without authorization and in case personnel leaves the company their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management processes to deploy relevant security updates on a regular and periodic basis. • Full remote access to SAP’s corporate network and critical infrastructure is protected by authentication.
System Access Control. Kendali Akses Sistem.
System Access Control. Data processing systems used to provide the SAP Service must be prevented from being used without authorization.
System Access Control. Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.
System Access Control. Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. // システムアクセス制御 「クラウドサービス」の提供のために使用されるデータ処理システムでは、権限のない使用を防止しなければならない。 • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy // 機密に関するシステム(「個人データ」の格納及び処理を行うシステムを含む)に対してアクセス権を付与する際は、複数の権限付与レベルが用いられる。権限は、「SAP セキュリティポリシー」に従った明確なプロセスで管理される。 • All personnel access SAP’s systems with a unique identifier (user ID). // すべての職員は、固有の識別情報(ユーザー ID)を使用して、SAP のシステムにアクセスする。 • SAP has procedures in place to so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. // SAP では、要請された権限の変更が、「SAP セキュリティポリシー」に従ってのみ実行されるようにする手続きが導入されている (たとえば、承認なしにいかなる権利も付与されないなど)。職員が退職する場合、そのアクセス権は取り消される。 • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. // SAP では、パスワードの共有を禁じ、パスワードの開示に対する対応を定めるとともに、定期的にパスワードを変更しデフォルトのパスワードは変更することを要求する、パスワードポリシーを定めている。個人専用のユーザー ID が、認証のために割り当てられる。すべてのパスワードは定められた最小要件を満たしていなければならず、暗号化された形式で保存される。ドメインパスワードについては、システムにより、6 カ月ごとに、複雑なパスワードの要件に従ったパスワードの変更が義務付けられる。各コンピューターには、パスワードで保護されたスクリーンセーバーが備えられている。 • The company network is protected from the public network by firewalls. // 会社のネットワークは、ファイアウォールにより、公共ネットワークから保護されている。 • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. // SAP は、会社のネットワークに対するアクセスポイント(電子メールアカウント用)に加えて、すべてのファイルサーバー及びすべてのワークステーションで、最新のアンチウィルスソフトウェアを使用している。 • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication. // 関連するセキュリティアップデートの定期的なデ...
System Access Control. The following may, among other controls, be applied depending upon the particular Cloud Services ordered: authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and logging of access on several levels. For Cloud Services hosted @Oracle: (i) log-ins to Cloud Services Environments by Oracle employees and Subprocessors are logged; (ii) logical access to the data centers is restricted and protected by firewall/VLAN; and (iii) intrusion detection systems, centralized logging and alerting, and firewalls are used.
System Access Control. The following measures are implemented to protect against the unauthorized access to and use of data processing systems used to provide Services on the Platform: a) User and administrator access to the data center facilities, servers, networking equipment, and host software is based on a role based access rights model. A unique ID is assigned to ensure proper user-authentication management for users and administrators on all system components. b) The concept of least privilege is employed, allowing only the necessary access for users to accomplish their job function. When user accounts are created, user accounts are created to have minimal access. Access above these least privileges requires appropriate authorization. c) IT access privileges are reviewed on a regular basis by appropriate personnel. d) Access to systems is revoked within a reasonable timeframe of the employee record being terminated (deactivated). e) First time passwords/passphrases are set to a unique value and changed immediately after first use. f) User passwords/passphrases are changed at least every 90 days and only allow complex passwords. g) Time stamped logging of security relevant actions is in place. h) Automatic time-out of user terminal if left idle, with user identification and password required to reopen. i) Assets (e.g. laptops) are configured with anti-virus software that includes e-mail filtering and malware detection. j) Firewall devices are configured to restrict access to the computing environment and enforce boundaries of computing clusters. k) Firewall policies (configuration files) are pushed to firewall devices on a regular basis.