Access Control Policy
This document provide principles and guidance on specific aspects of access control to Information Assets and Systems.
Scope
This Policy applies to all, including but not limited to Employees, Third-parties, servers, network devices, external storage media, applications, that contain or transmit the Corporate Groupâs information.
This Policy applies throughout the EClaims Group as part of the information security management system framework.
General Requirements
Access to the information assets and systems is based on the following principles:
Need to know â users or resources must be granted access to information assets or systems that is necessary to fulfil their roles and responsibilities
Least privilege â users or resources will be provided with the minimum privileges necessary to fulfil their roles and responsibilities.
Role-based access control is utilized to support the segregation of incompatible functions.
Access provision, modification, and dismissal to information asset or system must be registered in the EClaims Groupâs ticketing system.
Requests for usersâ accounts and access privileges must be formally documented and appropriately approved.
Access rights must be immediately (no later than 24 hours of termination date) disabled or removed when the user is terminated or ceases to have a legitimate reason to access the Corporate Groupâs information.
Access Control Requirements
All users must use a unique ID to access the EClaims Groupâs systems and applications.
Passwords must be set in accordance with the Information Security Requirements Standard.
Remote access to the Corporate Group systems and applications must use two-factor authentication where possible.
Privileged Accounts
A nominative and individual privileged user account must be created for the administrator accounts.
Shared User Accounts
Shared user accounts are only to be used on an exception basis with the appropriate approval. This includes general user accounts such as âguestâ and âfunctionalâ accounts.
Vendor or Default User Accounts
Where possible, all default user accounts must be disabled or changed.
These accounts include âguestâ, âtempâ, âadminâ, âAdministratorâ, and any other commonly known or used default accounts, as well as related default passwords used by vendors on âcommercial off-the-shelfâ systems and applications.
The organization acknowledges internal users, such as project bots, created by the systems we employ, having assessed that they do not pose a risk.
Test Accounts
Test accounts can only be created if they are justified by the relevant business area or project team.
Third-party Access
Third-parties are required to sign a Non-disclosure Agreement (NDA) before obtaining access to EClaims Groupâs information in systems and applications.
Review of User Access Rights
On an annual basis or more frequently if needed access to Information Assets and Systems must be reviewed by Information Asset Owners. Discrepancies must be remediated accordingly.
Policy Review and Update
This Policy must be maintained in accordance with the Information Security Policy.
Revision History
0.1
LĆ
GK
2023-05-20
2023-05-23
0.2
LĆ
DM
2023-11-02
2023-11-02
0.3
GK
DM
2024-09-10
2024-09-10
Last updated