Department of Information Technology Office of Information Security Title Access Control Policy Purpose and Objectives It is the purpose of this document to establish policy, provide guidance, and set forth the basic principles to be followed in the administration of access controls for information assets. This Access Control Policy reflects the College’s goals for managing access to information assets according to a standard of due care. The IT department will implement a balance of physical, technical, and administrative access controls in line with other restructured institutions of Higher Education in the Commonwealth of Virginia. Scope This Access Control Policy governs the following types of access: · · · Logical access to the network, general IT services, Sungard HE enterprise applications, and access to server operating systems, applications and configuration files; Physical access; Remote access to IT systems and services. Policy Access to information assets and processing facilities will be managed and controlled using a combination of preventive and detective physical, technical, and administrative access controls. Logical access to the College’s network, applications, and data will be granted on a need to access basis as required by an individual’s job role and responsibilities. Requests for group accounts or affiliate accounts will require additional review and stricter limitations. All requests for access will be reviewed by the appropriate IT staff member and/or system owner. Account audits will be performed periodically and regularly. Audit results will be reviewed and acted upon appropriately. Physical access to IT facilities housing information systems classified as highly sensitive will be protected using electronic key cards and alarms. Periodic and regular audits of key card holders will be conducted and reported to the Information Security Office. Guest access will require an IT staff member sponsor the guest and log the activity. Facilities housing non-sensitive IT systems will be protected using lock and key security controls. Access to the Jones Hall IT facility requires approval by the Director of Systems and Support. Access to the Blow Hall IT facility and all other network closets requires approval by the Network Manager. Key card audits will be performed periodically and regularly. Audit results will be reviewed and acted upon appropriately. Procedures For detailed procedures and standards supporting this policy refer to the following: Physical and Environmental Security Standard WM Account Standard INB Account Standard Application and OS Access Control Standard Remote Access Control Standard Network Access Control Standard Page 1 of 2 Department of Information Technology Office of Information Security Definitions Revisions Version 06012008 Author Pete Kellogg, ISO Notes Date 6-1-2008 Approvals Name of reviewer Courtney Carpenter Title Chief Information Officer Page 2 of 2 Signature Date 8-1-08