Access Control Policy V3.0
Access Control Policy V3.0
Access Control Policy V3.0
-Confidential-
All information contained in this document is proprietary and intended solely for use by
1
Document Control
Document Publication History
Authorized Signatory
2
Table of Contents
1. OVERVIEW ..................................................................................................................................4
2. PURPOSE......................................................................................................................................4
3. SCOPE............................................................................................................................................4
4. POLICY ..........................................................................................................................................4
3
1. Overview
The JSPL Information Security policy serves to be consistent with best practices
associated with organizational Information Security management. It is the intention of
this policy to establish an access control capability throughout JSPL to help the
organization implement security best practices with regard to logical security, account
management, and remote access.
2. Purpose
The purpose of this policy is to ensure that access controls are implemented in
compliance with Information Technology policies and procedures.
3. Scope
• This policy applies to all employees (permanent & contract employees) and non-
employees (consultants, contractors, vendors, suppliers and customers) of JSPL and its
group companies.
• Here “JSPL” is being refer for “JSPL and its group companies”.
• The policy covers all information and information processing systems owned and
managed by the IT department of JSPL.
4. Policy
This policy is applicable to all departments and employees/users of JSPL resources and
assets.
4.1 Account Management
JSPL IT Department shall:
• Identify and select the following types of information system accounts to support
organizational missions and business functions: individual, shared, group, system,
guest/anonymous and service.
• Assign account managers for information system accounts.
• Establish conditions for group and role membership.
• Specify authorized users of the information system, group and role membership, and
access authorizations (i.e., privileges) and other attributes (as required) for each
account.
• Require approvals by system owners (typically location IT HOD) for requests to create
information system accounts.
• Create, enable, modify, disable, and remove information system accounts in
accordance with approved procedures.
• Notify account managers when accounts are no longer required, when users are
terminated or transferred, and when individual information system usage or need-to-
know changes.
• Authorize access to the information system based on a valid access authorization or
intended system usage.
• Review accounts for compliance with account management requirements annually.
4
• Ensure that the information system disables temporary and emergency accounts after
usage.
• Ensure that the information system disables inactive accounts after 30 days of
inactivity.
• Ensure that the information system audits account management activities monthly.
5
4.5 System Use Information
IT Department shall ensure that the information system:
• Displays to users an approved system uses notification message or banner before
granting access to the system that provides privacy and security notices consistent
with applicable state and federal laws, directives, policies, regulations, standards, and
guidance and states informing that:
o Users are accessing a JSPL information system.
o Information system usage may be monitored, recorded, and subject to audit.
o Unauthorized use of the information system is prohibited and subject to criminal
and civil penalties.
o Use of the information system indicates consent to monitoring and recording.
o There are not rights to privacy.
• Retains the notification message or banner on the screen until users acknowledge the
usage conditions and take explicit actions to log on to or further access the
information system.
6
4.9 Wireless Access
JSPL IT Department shall:
• Establish usage restrictions, configuration/connection requirements, and
implementation guidance for wireless access.
• Ensure that the information system protects wireless access to the system using
authentication of users or devices.
7
5. Policy Compliance
• Compliance Measurement
The Information security team will verify compliance to this policy through various
methods, including but not limited to, periodic walk-through, business tool reports,
internal and external audits, and feedback to the policy owner.
• Exceptions
Any exception to the policy must be approved by the Information Security Committee
in advance.
• Non-compliance
An employee found to have violated this policy may be subject to disciplinary action,
up to and including termination of employment.