Access Control Policy
Access Control Policy
1. Purpose
1.1. The purpose of this policy is to outline requirements related to logical, physical and paper-
based access management controls to protect Company information assets.
2. Scope
2.1. Technical and procedural access controls related to global Company servers, networks and
applications, facilities and paper documentation.
3. References
3.1. POLICY-0302 Enterprise Cyber Security Policy - Global
4. Definitions
4.3. Information Risk Committee – business leaders that are responsible for making risk
management and policy decision related to cyber-security, privacy, eDiscovery and continuity
planning
4.4. Business Insights & Technology Solutions (BI&TS) Leadership – The Chief Information &
Digital Officer and direct reports.
4.5. Active Directory – a system developed by Microsoft to centralize the management of
computers and User Accounts and to provide authentication and authorization.
4.6. Company Information – any data produced by or on behalf of the Company or its employees
that is not publically available
4.7. Least Privilege – the principle that users and programs should only have the necessary
privileges to complete their tasks and no more.
4.8. Privileged Account – a User Account (as defined herein) that is authorized to perform
security-relevant functions that ordinary users are not authorized to perform such as installing
updates and application software, managing User Accounts and modifying system settings.
4.9. Service Account – an account that is not associated with a person that is used to perform
functions on a computing system.
4.10. User Account – an account with limited privileges that is used to perform general system
activities.
4.11. User ID – a unique value used by an information system to identify a specific user.
5. Responsibilities
5.1. All Company employees, contractors, sub-contractors, joint ventures, board members, and
vendors must comply with this policy.
5.2. The Company’s Chief Digital & Information Officer (CD&IO) is responsible for establishing
and administering all Cybersecurity policies.
5.3. Business Insights & Technology Solutions (BI&TS) Leadership - the CD&IO and direct
reports are responsible for approving any exceptions to this policy.
5.4. Information Risk Committee is responsible for risk management and policy decisions.
Page 1 of 3
CONFIDENTIAL AND PROPRIETARY Doc #:POLICY-0303 Rev:6 Vault:CLT-IT Effective Release Date:09 Oct 2020 Valid as of:10 Oct 2020
MALLINCKRODT
Doc Title: Access Control Policy
6. Policy
6.1. User Account Management
6.1.1. User authentication controls shall be implemented to protect all information assets that
verify the identity of an individual and confirm authorization prior to allowing access to
Company information assets.
6.1.2. Specific authorization and approval shall be obtained prior to granting access to computing
systems.
6.1.3. Access shall be removed when employees leave the company or when a contractor,
supplier or other third party responsibilities are no longer necessary or appropriate.
6.1.4. Periodic access reviews shall be performed to confirm the ongoing appropriateness of
access, unnecessary access shall be removed in a timely manner and evidence of review
shall be maintained.
6.6.1.User passwords shall expire every 90 days. Accounts must lock for passwords that are not
changed by the expiration date.
Page 2 of 3
CONFIDENTIAL AND PROPRIETARY Doc #:POLICY-0303 Rev:6 Vault:CLT-IT Effective Release Date:09 Oct 2020 Valid as of:10 Oct 2020
MALLINCKRODT
Doc Title: Access Control Policy
6.6.2. Password history shall prevent reuse of recent passwords. Systems shall be configured to
prevent password reuse to the maximum history allowed by the software.
6.6.3. Default vendor passwords shall be changed immediately following installation of systems
or software.
7. Attachments
7.1. None.
8. Revision History
Page 3 of 3
CONFIDENTIAL AND PROPRIETARY Doc #:POLICY-0303 Rev:6 Vault:CLT-IT Effective Release Date:09 Oct 2020 Valid as of:10 Oct 2020
MALLINCKRODT
Doc Title: Access Control Policy
Signature Manifest
Document Number: POLICY-0303 Revision: 6
Title: Access Control Policy
All dates and times are in UTC.
DCC Review
Create/Revise
Peer Collaboration
Author/Department Approval
Final QA Approval
Training
CONFIDENTIAL AND PROPRIETARY Doc #:POLICY-0303 Rev:6 Vault:CLT-IT Effective Release Date:09 Oct 2020 Valid as of:10 Oct 2020
MALLINCKRODT
Doc Title: Access Control Policy
Set Dates
Notification
CONFIDENTIAL AND PROPRIETARY Doc #:POLICY-0303 Rev:6 Vault:CLT-IT Effective Release Date:09 Oct 2020 Valid as of:10 Oct 2020