The objectives of AU’s policy for access control are:
This access control policy is intended to ensure that the responsible managers establish, document and review the user authorisations granted to their employees A (9.1.1)
In relation to the above, the follow is particularly applicable to AU:
Users and AU employees shall only be given access to the networks and systems they have been specifically authorised to use. (A.9.1.2)
A formal registration and deregistration procedure shall be implemented to enable assignment of access rights. (A9.2.1)
For overall AU systems, this takes place in the ‘medarbejderstamkort’ (employee registration) system. For other systems, a registration procedure shall be put in place, for example a spreadsheet.
A formal procedure for assigning user access to enable the assignment or withdrawal of registration rights for all user types for all systems and services. (A.9.2.2)
The allocation and use of privileged access rights shall be restricted and controlled. (A.9.2.3)
Physical and logical access shall be controlled.
The allocation of secret authentication information shall be controlled through a formal management process. (A.9.2.4)
Access codes and password control in addition to two-factor authentication shall be integrated into the systems that are used at AU.
Asset owners shall review users’ access rights at regular intervals. (A.9.2.5)
The access rights of all employees and external party users to information and information processing facilities shall be removed upon termination of their employment, contract or agreement, or adjusted upon change. (A.9.2.6)
A number of initiatives have been planned and established in order to comply with the abovementioned requirements:
This means that if you can keep your critical, confidential or sensitive information stored in the centrally offered solutions, they are secured by Aarhus University. If you have other needs based on your risk assessment, they must be secured locally. |
Users shall be required to follow the organization’s practices in the use of secret authentication information. (A.9.3.1)
Particularly with regard to to privileged access and controlling access to operating systems, Aarhus University’s procedures for access control shall ensure that:
Access to source code for development projects shall be restricted and controlled, and source code may not be stored in the development environment.
AU’s Information security policy:
https://medarbejdere.au.dk/en/informationsecurity/informationsecuritypolicy
Physical access control: See A.11 Policy for physical and environmental security
https://medarbejdere.au.dk/en/informationsecurity/physical_security
QUESTION GUIDE
Consider the question guide as a tool to navigate the requirements of the policy: