Page 143 - CISSO_Prep_ Guide
P. 143

of activities. Dual control often requires two separate people
            working together simultaneously to complete a task.



            Location-based Access
            When a user logs in from their desk - a more controlled
            environment - then they may have their full access rights, but if
            they log in remotely - from an uncontrolled environment, then
            their access may be more limited. It could be that they are
            unable to download any data or access more sensitive
            information when at a remote location.


            Levels of Access

            The levels of authorization are based on the principles listed
            above, according to the requirements of the user. Some users
            may be administrators and have nearly unlimited access, while
            others may have read-only or write-only access. The term
            sometimes used is CRUD (Create, Read, Update, Delete). The
            level of access granted should only be according to the job
            requirements, and the user should use that access with an
            awareness of the policy, procedures, and responsibility that
            comes with access.

            When an administrator has an account with high-level access,
            they should use that account sparingly and have another less
            privileged account that they use for normal activity. Of course,
            all activities done at the administrator level should be logged
            and traceable back to the individual administrator. These logs
            must be reviewed to ensure that no unauthorized changes have
            been made.
   138   139   140   141   142   143   144   145   146   147   148