AC.L1-B.1.I
Authorized Access Control
FCI Data
Security Requirement
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
USU Policy, Procedures, and Standards
University Policy 5200: Information Security and Appropriate Use
- Section 2.2 - Appropriate Use and Terms of Use
- Section 2.3 - Device and Endpoint Management and Security
- Section 3.8 - User Responsibilities
States that access to restricted resources is based on roles, using authentication. Users must protect credentials.
NIST Cybersecurity Framework v2
- Protect (PR): PR.AA-01 - Identities are managed for authorized users, processes, and devices.
- Protect (PR): PR.AA-03 - Access to assets and associated facilities is limited to authorized users, processes, and devices.
Implementation Details
Documentation should include details to meet the Security Requirement for this control. Complete this list for each system or systems that process or access FCI data:
- List your process for ensuring that only authorized users have access. Include processes for onboarding, offboarding, and regularly auditing access.
- List the technical controls used for limiting access to systems to only authorized staff
- List the Process for approving devices that are allowed to connect to USU systems
- List any additional process or procedures you have that helps meet the control’s security requirement.
Document How
- authorized users are identified
- processes acting on behalf of authorized users are identified
- devices (and other systems) authorized to connect to the system are identified
- system access is limited to authorized users
- system access is limited to processes acting on behalf of authorized users
- system access is limited to authorized devices (including other systems)
Example
Machines are managed by USU IT according to the desktop management initiative. Each employee is issued a unique A# with specific password requirements that must be used to log on to all computers and systems that store FCI. Multi-Factor Authentication (MFA) is required for all SSO-enabled services. Employees using wireless to connect to USU systems must use eduroam, which provides an encrypted session. Remote connections must be made from USU-managed computers and require the use of GlobalProtect VPN, which provides an encrypted secure connection to USU systems.
How might an auditor assess this control?
Method
- Examine:
- Look at your policies, login screens, account settings, or system configuration to see how access is limited.
- Interview:
- Ask staff questions like: “How do you make sure only the right people get in?” or “What do you do when someone leaves?”
- Test:
- Try logging in as a new person or on a new device to see if the system follows the rules.
Objects (examples of items you could present to the auditor)
- Access Control Policy: A document that says who is allowed in and how they get in.
- User Account Lists: A list of people who have logins to your systems.
- Device Lists: A list of approved computers or devices.
- System Configurations: Screenshots or settings that show how your login system works.
- Audit Logs: Computer records showing who logged in and when.
- Offboarding Checklist: A list of things you do when someone leaves - like removing their access.