What are the best practices every Information Security Access Control Policy should include? We are reviewing and updating our Enterprise wide Information Security Access Control Policy.

1.6k viewscircle icon33 Upvotescircle icon2 Comments
Sort by:
Engineering Manager in Software2 years ago

Least Privilege: Grant minimal access needed for job roles, only what is necessary. 

User Access Management: Control user onboarding, modification, and removal.

Strong Authentication: Enforce strong authentication methods like MFA. you can also leverage tools like Okta.

Password Management: Set guidelines for secure passwords. Revoke old passwords often. 

Access Control for Systems: Implement user roles and permissions.

Account Monitoring and Logging: Log user access and system events.

Lightbulb on2
Head of ISG in Finance (non-banking)3 years ago

When reviewing and updating your enterprise-wide Information Security Access Control Policy, it is important to consider the following best practices

·        Principle of Least Privilege.

·        Role-Based Access Control (RBAC

·        User Authentication

·        Access Reviews and Auditing.

·        Access Control for Remote Access

·        Separation of Duties

·        Access Control for Third-Party Users

·        Password Management

·        Access Control for Data

·        Regular Policy Review and Updates

Remember that these best practices serve as general guidelines, and you should tailor them to fit the specific needs and requirements of your organization. It is also recommended to consult with security professionals or seek legal advice to ensure compliance with relevant laws and regulations.

Lightbulb on1

Content you might like

Yes, it is part of my vision and mission 38%

Yes but I have difficulty to enroll in 41%

I know them but I don't believe they are a must be30%

Our business is focused on the ROI, period.18%

I am not sure, let's discuss in the comments.1%

View Results

We are fully committed to a low code development strategy, and it complements our custom development strategy.36%

We do not have a low code development strategy.32%

We are planning to implement a low code development strategy.25%

We don't believe we need a low code development strategy.5%

View Results