Table of Contents

3.5 Identification & Authentication

Control Satisfaction Matrix

Standard Category Controls Satisfied 800-53r4 Controls ISO/SEC 27001 A-lign Controls
NIST 800-171 Identification & Authentication 3.5.1 - 3.5.11 IA-2, IA-2(1), IA-2(2), IA-2(3), IA-2(8), IA-2(9), IA-3, IA-4, IA-5, IA-5(1), IA-6 A.9.2.1, A.9.2.4, A.9.3.1, A.9.4.3, A.12.5.1, A.12.6.2 9.0, 10.0

Major Document History

Date Comment Who
7/29/2019 Initial Doc, 9.0, 10.0 Tharp
8/09/2019 Updated, 9.6, 10.5 Tharp
8/12/2019 Format Tharp
8/29/2019 Database PW Plan Removed, Copied Content For IS-1 SOC submission Tharp
10/6/2021 Policy's Reviewed for Audit Tharp

Purpose and Scope

The purpose of this policy is to establish the organizational requirements for Identification & Authentication management practices to ensure we operate within a secure infrastructure, using methods that meet or exceed industry best practices as well any governing compliance frameworks necessary to support our customers.

Background

Provide guidance and operation methods and processes that must be maintained to conform with these policies.

Policy

3.5.1

Identify system users, processes acting on behalf of users, and devices.

3.5.2

Authenticate (or verify) the identities of users, processes, or devices, as a prerequisite to allowing access to organizational systems.

3.5.3

Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.

3.5.4

Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.

3.5.5

Prevent reuse of identifiers for a defined period.

3.5.6

Disable identifiers after a defined period of inactivity.

3.5.7

Enforce a minimum password complexity and change of characters when new passwords are created.

3.5.8

Prohibit password reuse for a specified number of generations.

3.5.9

Allow temporary password use for system logons with an immediate change to a permanent password.

3.5.10

Store and transmit only cryptographically-protected passwords.

3.5.11

Obscure feedback of authentication information.


Response Plan

9.0 Password Plan (All Systems)

9.1 Overview

All DLZP Group employees (including contractors and vendors with access to DLZP Group systems) are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords.

9.2 Purpose

The purpose of this Plan is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change.

9.3 Scope

The scope of this Plan includes all personnel who have or are responsible for an account (or any form of access that supports or requires a password) on any system that resides at any DLZP Group facility, has access to the DLZP Group network, or stores any non-public DLZP Group information.

9.4 Plan

9.4.1 General

9.4.1.1 Password Protection Standards

Do not use the same password for DLZP Group accounts as for other non-DLZP Group access (e.g., personal ISP account, option trading, benefits, etc.). Where possible, don't use the same password for various DLZP Group access needs.

Do not share DLZP Group passwords with anyone, including administrative assistants or secretaries. All passwords are to be treated as sensitive, Confidential DLZP Group information.

Here is a list of “don’ts”:

If someone demands a password, refer them to this document or have them call the DLZP Leadership.

Do not use the “Remember Password” feature of Windows or applications (e.g., Internet Explorer, Outlook, Netscape, etc.).

Again, do not write passwords down and store them anywhere in the office. Do not store passwords in a file on ANY computer system (including mobile or similar devices) without encryption.

If an account or password is suspected to have been compromised, report the incident and change all passwords.

Administrative password cracking or guessing may be performed on a periodic or random basis. If a password is guessed or cracked during one of these scans, the user will be required to change it.

9.4.1.2 Application Development Standards

Application developers must ensure their programs contain the following security precautions. Applications:

9.4.1.3 Use of Passwords and Shared Keys for Remote Access Users

Access to the DLZP Group network via remote access (VPN) is to be controlled using either password authentication or a shared key system managed by a VPN client.

9.4.2 Active Directory

9.4.3 Connections

9.5 Enforcement

Any employee found to have violated this Plan may be subject to disciplinary action, up to and including termination of employment.

9.6 Definitions

TermDefinition
Application Administration AccountAny account that is for the administration of an application (e.g., Oracle database administrator).
Min PW RequirementsMust be at least 10 characters long, Must include at least one uppercase letter, Must include at least one lowercase letter, Must include at least one number, Must include at least one special character
Computer languageA language used to generate programs.
CredentialsSomething a user knows (e.g., a password or pass phrase), and/or something that identifies a user as being present for authentication (e.g., a user name, a fingerprint, voiceprint, retina print).
EntitlementThe level of privilege that has been authenticated and authorized. The privileges level at which to access resources.
Executing bodyThe series of computer instructions that the computer executes to run a program.
HashAn algorithmically generated number that identifies a datum or its location.
LDAPLightweight Directory Access Protocol, a set of protocols for accessing information directories.
ModuleA collection of computer language instructions grouped together either logically or physically. A module may also be called a package or a class, depending upon which computer language is used.
Name spaceA logical area of code in which the declared symbolic names are known and outside of which these names are not visible.
ProductionSoftware that is being used for a purpose other than when software is being implemented or tested.
Min PW RequirementsMust be at least 14 characters long, Must include at least one uppercase letter, Must include at least one lowercase letter, Must include at least one number, Must include at least one non-alphanumeric character