S 2.63 Establishing access rights
Initiation responsibility: IT Security Officer, Head of IT
Implementation responsibility: Administrator, Persons responsible for individual applications
If several users are working with an IT system, a proper administration of the access rights must be used to ensure that the users can only use the IT system in accordance with their tasks.
The prerequisite for the aforementioned is that specialists responsible have defined the site and access authorisations for the individual functions (see S 2.7 Granting of (system/network) access authorisations and S 2.8 Assignment of access rights). Then, the users of the IT system are assigned to the individual functions. The results must be documented in writing.
The administrator must configure the IT system in such a way that these users are granted access to the IT system and can perform their tasks with the access rights assigned to them. If the IT system does not provide the option of assigning access rights (e.g. the DOS-PC with several users) an additional product must be used to this end (see e.g. S 4.41 Use of a appropriate security products for IT systems).
If the IT system provides for this option, the reasonably usable logging functions for the retention of evidence must be activated by the administrator. This includes successful and unsuccessful login and logout procedures, error messages of the system, unauthorised access attempts.
In the event of a substitution, the administrator must check in advance whether the representative was authorised by the Specialist Responsible. Only then the administrator may assign the required access rights in an acute case of substitution.
Review questions:
- Does the configuration of the IT system ensure that users can only perform the tasks assigned to them?
- If the IT system does not provide for any option of assigning access rights: Is an additional security product used which ensures that accesses are only possible in accordance with the previously defined specifications?
- Were logging functions, e.g. for unsuccessful login procedures, unauthorised access attempts, as well as system errors, activated?
- For substitution solutions: Does the administrator check the authorisation of the representative before granting any access rights?