Privileged/Role-based/Service/Process Account Maintenance and Security



Similar documents
Account Management Standards

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

Oracle WebCenter Content

Server Account Management

e-governance Password Management Guidelines Draft 0.1

Workflow Templates Library

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures

The Impact of 21 CFR Part 11 on Product Development

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-

ICT USER ACCOUNT MANAGEMENT POLICY

Empower TM 2 Software

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Central Agency for Information Technology

Integrating Mac OS X 10.6 with Active Directory. 1 April 2010

Consensus Policy Resource Community. Lab Security Policy

Network Service Policy

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Full Compliance Contents

This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.

Server Security Checklist (2009 Standard)

USFSP Network Security Guidelines

DIVISION OF INFORMATION SECURITY (DIS)

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Tools to Aid in 21 CFR Part 11 Compliance with EZChrom Elite Chromatography Data System. White Paper. By Frank Tontala

Monitoring Clearswift Gateways with SCOM

FairWarning Mapping to PCI DSS 3.0, Requirement 10

Best Practices for PCI DSS V3.0 Network Security Compliance

The Comprehensive Guide to PCI Security Standards Compliance

Single Sign-On for Kerberized Linux and UNIX Applications

CAPITAL UNIVERSITY PASSWORD POLICY

CorreLog Alignment to PCI Security Standards Compliance

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

NC Identity Management (NCID)

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Introduction. Connection security

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Enhanced Login Security Frequently Asked Questions

Managing UNIX Generic and Service Accounts with Active Directory

FILEHOLD DOCUMENT MANAGEMENT SYSTEM 21 CFR PART 11 COMPLIANCE WHITE PAPER

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite

Compliance Matrix for 21 CFR Part 11: Electronic Records

Authorized. User Agreement

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Technical Proposition. Security

Change Management. Service Excellence Suite. Users Guide. Service Management and Service-now

March

Simple Solution. Brighter Futures. TEXAS STUDENT DATA SYSTEM TEAL for TSDS and the TSDS Portal Roles

Firewall Access Request Form

Internal Controls And Good Utility Practices. Ruchi Ankleshwaria Manager, Compliance Risk Analysis

SB 1386 / AB 1298 California State Senate Bill 1386 / Assembly Bill 1298

For Internet Facing and Private Data Systems

Department of Information Technology Active Directory Audit Final Report. August promoting efficient & effective local government

CITY OF BOULDER *** POLICIES AND PROCEDURES

How To Control A Record System

Potential Targets - Field Devices

CloudPassage Halo Technical Overview

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Standard: Event Monitoring

Data Stored on a Windows Server Connected to a Network

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

ResNet Connection for Windows 8

Secure Shell User Keys and Access Control in PCI-DSS Compliance Environments

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

N02-IBM Managed File Transfer Technical Mastery Test v1

Contact: Henry Torres, (870)

FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY

A ChemoMetec A/S White Paper September 2013

Remote Access Platform. Architecture and Security Overview

NetWrix Privileged Account Manager Version 4.0 Quick Start Guide

Migrating to vcloud Automation Center 6.1

SOLUTION WHITE PAPER. BMC Manages the Full Service Stack on Secure Multi-tenant Architecture

Virtualization Case Study

Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system.

Statement of Service Enterprise Services - AID Microsoft IIS

Global TAC Secure FTP Site Customer User Guide

Data Management Policies. Sage ERP Online

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, Integration Guide IBM

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

GE Measurement & Control. Cyber Security for NEI 08-09

Scheduling in SAS 9.3

Strengthen security with intelligent identity and access management

Payment Card Industry Compliance

/ Preparing to Manage a VMware Environment Page 1

Transcription:

Privileged/Role-based/Service/Process Account Maintenance and Security Policy: 1.19 Effective Date: 6/27/2011 Responsible Office: BU Information Security, IS&T Systems Operations, Scope The management and maintenance of accounts at BU is an important task that is shared by the administrators of the various systems, by the business and technical owners of the various processes and by BU Information Security. This procedure describes the request and approval process for obtaining privileges for a user account, an administrative account, a role-based account, or access to a service or process account. This procedure applies to all IS&T managed systems. Note that the requirements and provisions of this document apply immediately for all accounts created from this point on any IS&T systems and/or any hosted client systems. Accounts on systems currently in existence do not immediately fall under these requirements but should comply by July 1, 2013. Mainframe Z/OS account management is excluded from the scope of this document. Philosophy and Principles The principle of least privileges applies: To the extent possible, accounts should be granted sufficient privileges to perform the approved business function and no more. Where a person has multiple accounts or has the ability switch to a privileged account, the least privileged account will be used for the normal day to day non-privileged activities. The privileged account should only be used when the elevated privilege is required. Personal accounts and the passwords to those accounts may not be shared. Role-based accounts may be used sparingly as appropriate and only for executing functions of the particular role, see the Data Protection Standards for more details. In this context, a role-based account is an account that performs a given function required for a given role, but is not associated with a particular individual. All requests must be reviewed and approved from both a business and a technical perspective. The business approval confirms that the account requested is needed to perform a require business function and the technical approval confirms that the privilege requested is required to achieve the approved business need. Both the business and technical approvers should be managers as close to their respective areas of approval as practical to ensure that they have the requisite business and technical knowledge required to properly perform their duties. Separation of duties must be maintained: The person with the authority to approve a request should not be the person that fulfills the request. Data Custodians (Typically Systems Administrators, Database Administrators, Application Administrators, see the Data Management Guide for more details) are responsible for: BU Data Protection BU InfoSec Procedure - Priv Account Maintenance and Security Page 1

Executing the approved account definition/modification/removal request, after validating that appropriate approvals have been granted Ensuring the audit and event logging is properly configured and functioning normally, and that all required audit documentation is readily available Conduct quarterly internal system audits of system accounts and maintain documentation accordingly The Information Security Office is responsible for: Defining the general account management processes (this document) Consulting with system owners on system-specific account management processes Working with system owners to define and document appropriate audit procedures Conducting appropriate periodic audits of system accounts and the account management process General account management life cycle The general account management lifecycle includes several steps: Account request and provisioning 1) New account/privilege request is made using the institution s ticketing system 2) Request is sent to requestor s manager for business approval 3) Request is sent to the appropriate Data Trustee for approval if appropriate (see the Data Management Guide for more details) 4) Request is sent to the technical manager of the system in question for technical approval 5) Request will be forwarded to Information Security in cases where Restricted Use data may be present on the system or where specific memberships, trainings, or certifications are required for access to data on the system 6) Final approval is sent to the Data Custodian for implementation Account review 1) For every IS&T maintained system, a list of active accounts with privileged access will be provided to the appropriate business approvers for review and updating on an annual basis. 2) For any IS&T maintained system that contains information belonging to a give Data Trustee, the above report is to be forwarded to that Trustee or along with comments from the appropriate business approvers explaining the business need for the account/privilege. (This is to support the annual audit requirements of the Data Trustees, etc.) Account auditing / management process auditing 1) Information Security will review random systems and accounts on a random, periodic basis to ensure that this procedure is adhered to and that: BU Data Protection BU InfoSec Procedure - Priv Account Maintenance and Security Page 2

there is a request for every account with elevated privilege, role-based account, or service/process account the request was approved both by a business and technical manager the request is compliant with applicable regulation, policy, best practice the granted privileges were indeed required for the approved business use requests for temporary privileges are expired on the agreed expiration date every account is held by a person still at the institution the account holders business function still requires the granted privilege other tests as may be appropriate 2) Auditing will be conducted on a random sample of accounts and tickets, focusing on recent requests but including older requests as well. Account de-provisioning 1) Account/privilege removal request is made using the institution s ticketing system by the person s manager or designee or automated process. 2) Request is sent to technical manager of the system in question for information and routing 3) The technical manager will send the request to the Data Custodian for implementation. 4) Such accounts or privileges must be removed in a timely fashion following notification; generally within a few business days unless a specific timeframe is requested. BU Data Protection BU InfoSec Procedure - Priv Account Maintenance and Security Page 3

Account Request and Provisioning 1) Making the request Requests will be made, recorded, processed and archived using work flow features of the institution s service management solution, currently Service-Now (SN). Privileged access may be granted permanently only if that specific person s job duties routinely require that level of access, otherwise, the access will be temporary. Privileged access is dependent on the specific person s job duties, not the duties of the person s group. Temporary accounts and privileges must expire within 45 days or less; if more time is required, an extension may be requested on the original ticket. Request Fields for Accounts with elevated privileges Name: BU login: Department: Type of Request (indicate all that apply): I need an account created for me and given administrative privileges (sudo, e.g.) I have an account but need to be given administrative privilege (sudo, e.g.) I need a multi-machine administrator account created (username-adm, e.g.) I have an administrator account but need it authorized for a specific system I need access to an existing administrative account (root, administrator, e.g.) What server(s) or database(s) do you need access to? Is this request for temporary or permanent access? Temporary Permanent (due to job duties) If temporary, what is the end date: If permanent, describe job responsibilities that require ongoing access: Business Owner: Technical Owner: - If no, what level of privilege is granted: - Highest level of classification of data on the system: Restricted Use Confidential Internal Public - Does this system contain data that requires trustee approval: Yes No - What data: Data Trustee: Request Fields for Role-based Accounts, or access to Service or Process Accounts How will the account be accessed? [Shared password, Certificate or Identity Keys, Sudo]? If this request is being made for a named group of individuals, what is the name of the group: List the individuals that will have access to the account: If the account will be accessed by automated processes, what are they and what system(s) are they running on? Requested name for the service/process account: BU Data Protection BU InfoSec Procedure - Priv Account Maintenance and Security Page 4

Explain what access is needed and the business reason for this access: Business Owner: Technical Owner: - If no, what level of privilege is granted: - Highest level of classification of data on the system: Restricted Use Confidential Internal Public - Does this system contain data that requires trustee approval: Yes No - What data: Data Trustee: 2) Request approval Prior to creation of the account or granting of new privileges, the request must be approved from both a business and a technical perspective. Approvers should be managers as close to their respective areas of approval as practical to ensure that they have the requisite business and technical knowledge required to properly perform their duties. The request must first be approved by the requestor s manager. This person is responsible for understanding and approving the business need for the request. The request is then forwarded to the appropriate technical manager. This person is responsible for understanding what level of privilege is required to achieve the business objective and approving access to that level only. This person also determines 1. If the system contains information for which access must be approved by a Trustee 2. If the system contains Restricted Use information If the system contains information for which access must be approved by a Trustee, the technical manager forwards the ticket to the appropriate Trustee for review and approval. If the system contains Restricted Use information, the technical manager forwards the ticket to Information Security who confirms that the requestor has signed the appropriate confidentiality agreements, taken appropriate training, and/or holds appropriate credentials for accessing the resource. Privilege requests will be approved as follows: Service IS&T Servers (AIX, Linux, Windows, BUworks, VMWare, etc.) KCRM accounts DWBI accounts DARWIN accounts Campus E-Mail Relays Scientific Computing Resources Technical Component Owner Assistant Director of Technical Services Assistant Director of Technical Services Assistant Director of Technical Services Director, Dev Info Services, Development & Alumni Relations Director of Systems Engineering Manager of Systems for Scientific Computing BU Data Protection BU InfoSec Procedure - Priv Account Maintenance and Security Page 5

Information Security Servers Institutional Web Servers (www.bu.edu) Executive Director of Information Security Director of Systems Engineering Note: Mainframe accounts are not in scope for this policy at this time. sudoers file Systems with Restricted Use data BU Information Security BU Information Security 3) Implementation Approved requests are forwarded to the appropriate Data Custodian who verifies that the request has been properly approved, and creates the requested account and/or grants the approved privilege. Accounts intended for individuals should be part of the Global UID system and should use Kerberos authentication, if possible. Service/Process accounts may be defined locally. If the account is to be accessed via a password, the password should follow University password guidelines (see Access Management and Authentication Requirements). Root access and the sudoers file Administrative privilege (root, e.g.) to IS&T servers is restricted to Data Custodians and Information Security personnel unless special permission is granted by Information Security. If Administrator privilege is needed by anyone else, the request is made using the form and process described in this procedure, and an end date must be provided. The sudoers file grants a given account or group the ability to run programs as another user. For example, a user account may be granted the ability to run programs as the root user when needed. Such activities must be logged and the logs reviewed on a routine basis. Account Review Annual review of account on a system will be facilitated and documented for the following major services: Service BUworks Kuali Coeus Research Management (KCRM) Development & Alumni Relations Web-based Information Network (DARWIN) Data Warehouse Business Intelligence (DWBI) Service Owner* Ken Weeden Jen Halliday Lisa Uglialoro Mark Faria * Subject to change as these services mature. BU Data Protection BU InfoSec Procedure - Priv Account Maintenance and Security Page 6

Account Auditing / Management Process Auditing Security of a system is the responsibility of the Technical Component Owner and Data Custodians, with reference to Information Security for process and configuration guidelines and requirements. In order to ensure that the agreed processes and procedures are being properly followed, Information Security will periodically audit the systems, procedures and request tickets. Setting up the system to properly support auditing (and security) Security Event Logging Systems must be configured to properly log audit data. At minimum, the following events should be logged and reported: Successful authentications for all services, including shell access. Failed authentications for all services, including shell access. System-specific security events Access to privileged accounts such as root, including use of programs like sudo. Setting network adapters to promiscuous mode (where auditing is supported by the OS) FTP Activity: Connect, authenticate, read, write, close Application-appropriate log files Security Event Alerting The system should be configured to send system and security events and information to an external log collection/aggregation/analysis solution where applicable: Appropriate log excerpts (for example: /audit/trail and /var/adm/daemon) Attempts to delete or write to log files outside of the auditing system Instructions for doing this are available on TechWeb: http://www.bu.edu/tech/infrastructure/monitoring/logging/log-srv/ File Integrity Monitoring Systems should use file integrity monitoring tools such as Tripwire or Baseline (where available) to detect additions, changes to, and deletions of critical system files. The reports generated by these tools should be reviewed routinely by the local systems administrator for indications of unauthorized changes. Information Security may periodically audit these reports as well. More information is available on TechWeb: http://www.bu.edu/tech/infrastructure/monitoring/baseline/ Log review Security logs should be reviewed regularly by system administrators. Automated and manual techniques may be used as appropriate. The sudoers file output should be reviewed regularly to confirm a normal and expected pattern of use of root access. Unexpected use of root access must be explained and understood by the technical manager of that system who may escalate findings to Information Security if appropriate. BU Data Protection BU InfoSec Procedure - Priv Account Maintenance and Security Page 7

Creation and maintenance of auditing procedures Information Security will work with Data Custodians to develop, document and maintain the procedures required to properly review and protect university systems. The procedures will be reviewed and updated as required. Security process and account auditing Each quarter at a randomly selected, unannounced time, Information Security will perform an audit of a sample of systems and requests. The audit will be conducted on a random sample of accounts and tickets, focusing on recent requests and events but including older requests and events as well. Responsibilities of Information Security For a sample of at least 3 machines that may be randomly selected: Confirm that requests (Service Now tickets) exist for each account with privileged access to that machine Review the sudoers file output to confirm a normal and expected pattern of use of root access For a sample of at least 3 recently expired requests for temporary access: Confirm that the access has been removed in accordance with the requested expiration date documented in request For a sample of at least 5 requests: Confirm that the request was approved both by a business and technical manager and, if appropriate, the Data Trustee and Information Security Confirm that the approved business need was valid Confirm that the approved privileges were indeed required for the approved business reason For at least 3 randomly selected people: Review the list of all systems on which that person has escalated privileges. Confirm that the person is still employed by the university and is still in an organizational position and role where such privileges are appropriate. (This is to help confirm that access removal requests are being submitted appropriately.) Confirm with that person s manager and the system technical owner that such access is still appropriate. (This step is intended to understand and curb patterns of unwarranted privilege escalation.) Other tests as appropriate Account De-provisioning & Privilege De-escalation Managers are responsible for submitting a ticket requesting an appropriate change in account or privilege status when a person s job function changes, they transfer to another department or the leave the university. To ensure the security of our systems, this process must be accomplished in a timely fashion. Temporary accounts must be expired by the requested date or within 30 days, whichever is sooner. BU Data Protection BU InfoSec Procedure - Priv Account Maintenance and Security Page 8

Service Management Request Fields Name: BU login: What accounts or privileges need to removed on which systems/databases? Changing Passwords for Service/Process/Root/Administrator Accounts When a person that has a password or authentication token (ssh key, e.g.) for a service/process account no longer requires access, such as might result from changing positions or terminating employment, his or her manager is responsible for submitting a ticket requesting the password or token be changed. Due to the potential sensitivity of such accounts, it is preferred that the request be made in advance of change in responsibility (provide the effective date). If this is not possible, the request must be made within 1 business day following the change. References The Boston University Data Protection Standards including: The Data Classification Guide which discusses Restricted Use data The Data Management Guide which discusses Data Custodians and Data Trustees The Access Management and Authentication Requirements The BU Information Security Policy The BU Personal Information Protection Guidelines History Date Action By Version 6/21/2011 Original Quinn Shamblin, BU Information Security Draft 0.1 6/24/2011 Modification Gerard Shockley, BU System Administration Draft 0.2 4/20/2012 Final Quinn Shamblin, BU Information Security Gerard Shockley, BU System Administration x/xx/2012 (to be) Approved Tracy Schroeder, VP IS&T 1.0 Proposed 1.0 BU Data Protection BU InfoSec Procedure - Priv Account Maintenance and Security Page 9