S 2.8 Assignment of access rights

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator, Specialists Responsible

Data access rights are used to regulate who is authorised within the framework of their function to use IT applications or data. The data access rights (e.g. read, write and execute) for IT applications, parts of applications or data depend on the function assumed by the person (e.g. application support, work preparation, system programming, application development, system administration, auditing, data acquisition, data processing). When granting data access rights, only access rights necessary to perform the corresponding tasks should be granted ("need-to-know" principle). The data access rights must be implemented by the rights administration of the IT system.

A number of IT systems allow you to define different rights as group rights or rights profiles (e.g. the Data Acquisition group). This definition corresponds to the technical implementation of the rights assigned to a given role or function. Creating such groups or profiles makes rights administration on an IT system easier since it can make assigning and changing these rights much simpler.

The specification of the data access rights and any changes to them must be performed and documented by the corresponding person responsible. The documentation must contain the following information:

The procedure for separating functions and assigning access rights is illustrated in the following example.

The application examined is a travel expense accounting system. The relevant rooms are shown in the following diagram. The IT system consists of a LAN to which three PCs, a server and the operating console are connected.

Division of responsibilities and separation of functions
Figure: Division of responsibilities and separation of functions

Step 1: Division of responsibilities and separation of functions

The following functions are required for the travel expense accounting system examined:

  1. LAN administration
  2. Audit Department
  3. Data acquisition
  4. Processing, including verification of the mathematical accuracy
  5. Processing, including verification of the factual accuracy
  6. Processing, including the authority to order payment

The following functions are not compatible with each other due to inherent constraints:

These functions are fulfilled by the following people:

    Mr. Mayer Ms. Schmidt Mr. Mueller Ms. Fleiss
1. LAN administration X      
2. Audit Department   X    
3. Data acquisition     X  
4. Processing, mathematical accuracy     X  
5. Processing, factual accuracy     X  
6. Authority to order payment       X

Step 2: Assignment of site access rights

The following provides reasons for the given protection requirement of each type of room and documents the assignments of the site access rights in the table:

    Server room Document archive Office 1 Office 2
1. LAN administration X      
2. Audit Department X X X X
3. Data acquisition     X  
4. Processing, mathematical accuracy   X X  
5. Processing, factual accuracy   X X  
6. Authority to order payment   X X X

Step 3: Granting of (system/network) access authorisations

The following access authorisations result for the functions:

    Operating system server Application log evaluation Application data acquisition Application document processing
1. LAN administration X      
2. Audit Department X X   X
3. Data acquisition     X  
4. Processing, mathematical accuracy       X
5. Processing, factual accuracy       X
6. Authority to order payment       X

Step 4: Granting of (application/data) access authorisations

In the following, the data access rights needed to fulfil a function are shown. Legend:

     Operating system server Log evaluation Application data acquisition Application document processing
1. LAN administration E,R,W,M,D      
2. Audit Department E,L E,R,D   E,L
3. Data acquisition     E,W  
4. Processing, mathematical accuracy       E,R,M
5. Processing, factual accuracy       E,R,M
6. Authority to order payment       E,R,S

Such documentation makes it easier to allocate the rights. Assuming that Ms. Schmidt changes companies and her position needs to be filled, then it is easy to determine which of Ms. Schmidt's former rights need to be deleted and assigned to the new employee based on the tables above. If the new employee should also work as a substitute in processing and be allowed to order payments in this function, then the conflict arising from the fact that the new employee would be able to make changes without being detected when acting as a substitute becomes apparent when examining which rights the new employee would need to be granted.

Review questions: