Standard | Category | Controls Satisfied | 800-53r4 Controls | ISO/SEC 27001 | A-lign Controls |
---|---|---|---|---|---|
NIST 800-171 | Identification & Authentication | 3.5.1 - 3.5.11 | IA-2, IA-2(1), IA-2(2), IA-2(3), IA-2(8), IA-2(9), IA-3, IA-4, IA-5, IA-5(1), IA-6 | A.9.2.1, A.9.2.4, A.9.3.1, A.9.4.3, A.12.5.1, A.12.6.2 | 9.0, 10.0 |
Date | Comment | Who |
---|---|---|
7/29/2019 | Initial Doc, 9.0, 10.0 | Tharp |
8/09/2019 | Updated, 9.6, 10.5 | Tharp |
8/12/2019 | Format | Tharp |
8/29/2019 | Database PW Plan Removed, Copied Content For IS-1 SOC submission | Tharp |
10/6/2021 | Policy's Reviewed for Audit | Tharp |
The purpose of this policy is to establish the organizational requirements for Identification & Authentication management practices to ensure we operate within a secure infrastructure, using methods that meet or exceed industry best practices as well any governing compliance frameworks necessary to support our customers.
Provide guidance and operation methods and processes that must be maintained to conform with these policies.
Identify system users, processes acting on behalf of users, and devices.
Authenticate (or verify) the identities of users, processes, or devices, as a prerequisite to allowing access to organizational systems.
Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.
Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.
Prevent reuse of identifiers for a defined period.
Disable identifiers after a defined period of inactivity.
Enforce a minimum password complexity and change of characters when new passwords are created.
Prohibit password reuse for a specified number of generations.
Allow temporary password use for system logons with an immediate change to a permanent password.
Store and transmit only cryptographically-protected passwords.
Obscure feedback of authentication information.
All DLZP Group employees (including contractors and vendors with access to DLZP Group systems) are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords.
The purpose of this Plan is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change.
The scope of this Plan includes all personnel who have or are responsible for an account (or any form of access that supports or requires a password) on any system that resides at any DLZP Group facility, has access to the DLZP Group network, or stores any non-public DLZP Group information.
Do not use the same password for DLZP Group accounts as for other non-DLZP Group access (e.g., personal ISP account, option trading, benefits, etc.). Where possible, don't use the same password for various DLZP Group access needs.
Do not share DLZP Group passwords with anyone, including administrative assistants or secretaries. All passwords are to be treated as sensitive, Confidential DLZP Group information.
Here is a list of “don’ts”:
If someone demands a password, refer them to this document or have them call the DLZP Leadership.
Do not use the “Remember Password” feature of Windows or applications (e.g., Internet Explorer, Outlook, Netscape, etc.).
Again, do not write passwords down and store them anywhere in the office. Do not store passwords in a file on ANY computer system (including mobile or similar devices) without encryption.
If an account or password is suspected to have been compromised, report the incident and change all passwords.
Administrative password cracking or guessing may be performed on a periodic or random basis. If a password is guessed or cracked during one of these scans, the user will be required to change it.
Application developers must ensure their programs contain the following security precautions. Applications:
Access to the DLZP Group network via remote access (VPN) is to be controlled using either password authentication or a shared key system managed by a VPN client.
Any employee found to have violated this Plan may be subject to disciplinary action, up to and including termination of employment.
Term | Definition |
---|---|
Application Administration Account | Any account that is for the administration of an application (e.g., Oracle database administrator). |
Min PW Requirements | Must be at least 10 characters long, Must include at least one uppercase letter, Must include at least one lowercase letter, Must include at least one number, Must include at least one special character |
Computer language | A language used to generate programs. |
Credentials | Something a user knows (e.g., a password or pass phrase), and/or something that identifies a user as being present for authentication (e.g., a user name, a fingerprint, voiceprint, retina print). |
Entitlement | The level of privilege that has been authenticated and authorized. The privileges level at which to access resources. |
Executing body | The series of computer instructions that the computer executes to run a program. |
Hash | An algorithmically generated number that identifies a datum or its location. |
LDAP | Lightweight Directory Access Protocol, a set of protocols for accessing information directories. |
Module | A collection of computer language instructions grouped together either logically or physically. A module may also be called a package or a class, depending upon which computer language is used. |
Name space | A logical area of code in which the declared symbolic names are known and outside of which these names are not visible. |
Production | Software that is being used for a purpose other than when software is being implemented or tested. |
Min PW Requirements | Must be at least 14 characters long, Must include at least one uppercase letter, Must include at least one lowercase letter, Must include at least one number, Must include at least one non-alphanumeric character |