10.10.2014 Views

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

Policy 7230A - Department of Administration

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.3. Session Management<br />

The following are the Non-Mandatory Procedures that support the Session<br />

Management section <strong>of</strong> the Default Security Requirements:<br />

4.3.1. Configure Systems for Secure Access<br />

Agencies should ensure that systems are configured in such a way as to<br />

support and enhance user access and permission restrictions:<br />

4.3.1.1 Display System Use Notification<br />

To ensure that all users are aware that they are accessing<br />

organization owned systems and that they understand their<br />

responsibilities in regards to the use <strong>of</strong> these systems, a system use<br />

notification is to be presented at initial login.<br />

4.3.1.2 Require Identifiers and Authenticators for Access<br />

Access to systems is not only to be controlled, but auditable as well.<br />

To that end, system access requires the use <strong>of</strong> individually assigned<br />

system identifiers and authenticators:<br />

• Configure systems to require the use <strong>of</strong> identifiers for access<br />

control. Where inherent capabilities do not exist in the<br />

system, third party tools must be used.<br />

• Configure systems to require the use <strong>of</strong> authenticators for<br />

access control. Where inherent capabilities do not exist in the<br />

system, third party tools must be used.<br />

4.3.1.3 Initiate System Lock-Out<br />

Should system authentication fail a sufficient number <strong>of</strong> times, the<br />

user that failed authentication shall be locked out <strong>of</strong> the system for a<br />

per-determined period <strong>of</strong> time.<br />

• Should users not wish to wait the specified time period to reattempt<br />

authentication they may call the help desk and have<br />

the lock out lifted.<br />

4.3.1.4 Obscure Authenticator Feedback<br />

To limit the likelihood <strong>of</strong> authenticator information being suborned,<br />

systems are to be configured such that authenticator feedback is<br />

obscured:<br />

• Authentication information will not be shown or will not be<br />

shown in plain text while being entered.<br />

9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!