4.1.1 Access control policy
An access
control policy should be established, documented and reviewed based on business
and information security requirements.
See also CIS Control 5 Account Management and CIS Control 6 Access Control Management.
4.1.2 Access to networks and
network services
Users should
only be provided with access to the network and network services that they have
been specifically authorized to use.
4.2.1 User registration and
de-registration
A formal user
registration and de-registration process should be implemented to enable
assignment of access rights.
See also CIS Control 5 Account Management and CIS Control 6 Access Control Management.
4.2.2 User access provisioning
A formal user access provisioning process should
be implemented to assign or revoke access rights for all user types to all
systems and services.
4.2.3 Management of privileged
access rights
The allocation
and use of privileged access rights should be restricted and controlled.
4.2.4 Management of secret
authentication information of users
The allocation
of secret authentication information should be controlled through a formal
management process.
4.2.5 Review of user access
rights
Asset owners
should review users’ access rights at regular intervals.
4.2.6 Removal or adjustment of
access rights
The access
rights of all employees and external party users to information and information
processing facilities should be removed upon termination of their employment,
contract or agreement, or adjusted upon change.
4.3.1 Use of secret
authentication information
Users should be
required to follow the organization’s practices in the use of secret
authentication information.
4.4.1 Information access
restriction
Access to
information and application system functions should be restricted in accordance
with the access control policy.
4.4.2 Secure log-on procedures
Where required
by the access control policy, access to systems and applications should be
controlled by a secure log-on procedure.
4.4.3 Password management system
Password
management systems should be interactive and should ensure quality passwords.
4.4.4 Access control to program source code
Access to
program source code should be restricted.
created with
HTML Website Builder .