Access Control Policy
Title | Access Control Policy |
Doc# | POL-SECU-021 |
Version | 1.3 |
Date | 15-03-2024 |
Supersedes | POL-SECU-021 v1.2 (08-07-2023) |
Next Review | 15-03-2025 |
Owner | Security and Privacy Officer |
Approved By | Chief Information Officer |
DOCUMENT CONTROL NOTICE: This document contains references to deprecated policy POL-SECU-019 (Password Management) which has been merged into this policy. Some cross-references may require updating.
Access to CloudCore systems and applications is limited for all users, including but not limited to workforce members, volunteers, business associates, contracted providers, consultants, and any other entity, is allowable only on a minimum necessary basis. All users are responsible for reporting an incident of unauthorised user or access of the organisation’s information systems. These safeguards have been established to address the HIPAA Security regulations and industry best practices.
Policy Statements
CloudCore policy requires that
Access to all computing resources, including servers, end-user computing devices, network equipment, services and applications, must be protected by strong authentication, authorisation, and auditing.
Interactive user access must be associated to an account or login unique to each user.
All credentials, including user passwords, service accounts, and access keys, must meet the length, complexity, age, and rotation requirements defined in CloudCore security standards.
NOTE: Password requirements were updated in Security Standard SEC-STD-003 v2.1 but some systems may still be configured to older requirements. See Change Management Policy POL-CHANGE-001 for update procedures.
Use strong password and multi-factor authentication (MFA) whenever possible to authenticate to all computing resources (including both devices and applications).
MFA is required to access any critical system or resource, including but not limited to resources in CloudCore production environments.
IMPLEMENTATION GAP: Current MFA rollout covers 85% of critical systems. Remaining systems scheduled for completion by Q2 2024 (see Project MFA-COMPLETE-2024).
Unused accounts, passwords, access keys must be removed within 30 days.
A unique access key or service account must be used for different application or user access.
Authenticated sessions must time out after a defined period of inactivity.
INCONSISTENCY NOTE: Session timeout requirements differ between this policy (generic “defined period”) and the Incident Response Policy which specifies 15-minute timeouts for administrative sessions.
Privileged Access Management
CloudCore policy requires that
- Users must not log in directly to systems as a privileged user.
- A privileged user is someone who has administrative access to critical systems, such as a Active Directory Domain Administrator, root user to a Linux/Unix system, and Administrator or Root User to an AWS account.
Privilege access must only be gained through a proxy, or equivalent, that supports strong authentication (such as MFA) using a unique individual account with full auditing of user activities.
Direct administrative access to production systems must be kept to an absolute minimum.
VERSION CONTROL ISSUE: This section was last updated in v1.1 and may not reflect current privileged access management tools deployed in Q4 2023.
Controls and Procedures
Standards for Access Provisioning
Workforce Clearance
- The level of security assigned to a user to the organisation’s information systems is based on the minimum necessary amount of data access required to carry out legitimate job responsibilities assigned to a user’s job classification and/or to a user needing access to carry out treatment, payment, or healthcare operations.
- All access requests are treated on a “least-privilege” principle.
- CloudCore maintains a minimum necessary approach to access to Customer data. As such, CloudCore, including all workforce members, does not readily have access to any ePHI.
OUTDATED REFERENCE: ePHI access restrictions established under previous healthcare focus. Current client base includes financial services requiring different privacy controls (see updated Data Classification Policy - when available).
Person or Entity Authentication
- Each workforce member has and uses a unique user ID and password that identifies him/her as the user of the information system.
- Each Customer and Partner has and uses a unique user ID and password or OpenID Connect that identifies him/her as the user of the information system. This is enforced through the use of AWS Cognito.
- All customer support interactions must be verified before CloudCore support personnel will satisfy any request having information security implications.
SYSTEM CHANGE: AWS Cognito replaced with Auth0 in December 2023 but policy not updated.
Unique User Identification
- Access to the CloudCore Platform systems and applications is controlled by requiring unique User Login IDs and passwords for each individual user and developer.
- Passwords requirements mandate strong password controls (see below).
- Passwords are not displayed at any time and are not transmitted or stored in plain text.
- Default accounts on all production systems and environments, including root, are disabled/locked.
- Shared accounts are not allowed within CloudCore systems or networks.
Automatic Logon and Logoff
Automated log-on configurations that store user passwords or bypass password entry are not permitted for use with CloudCore workstations or production systems.
- Automatic log-on may only be permitted for low-risk systems such as conference room PCs connecting to a Zoom Room.
- Such systems are configured on separate network VLANs.
Users are required to make information systems inaccessible by any other individual when unattended by the users (ex. by using a password protected screen saver or logging off the system).
Information systems automatically lock users such as enabling password-protected screensaver after 2 minutes or less of inactivity.
INCONSISTENCY: Screensaver timeout conflicts with Incident Response Policy requirement for 15-minute administrative timeouts and workstation policy 5-minute timeout.
- Information systems automatically enter standby or log users off the systems after 30 minutes or less of inactivity.
- The Security Officer must pre-approves any exception to automatic log off requirements.
Password Management
User IDs and passwords are used to control access to CloudCore systems and may not be disclosed to anyone for any reason.
Users may not allow anyone, for any reason, to have access to any information system using another user’s unique user ID and password.
On all production systems and applications in the CloudCore environment, password configurations are set to require:
- a minimum length of 12 characters;
- a mix of upper case characters, lower case characters, and numbers or special characters;
- a 60-day password expiration, or 60-day password expiration for administrative accounts;
POLICY CONFLICT: NIST SP 800-63B recommends against regular password expiration, but this policy maintains 60-day rotation for compliance with legacy client requirements.
- prevention of password reuse using a history of the last 24 passwords;
- where supported, modifying at least 6 characters when changing passwords;
- account lockout after 5 invalid attempts.
!!! check “Exceptions”
Password expiration may be set to a greater interval if an account is always protected by MFA. Currently, Okta SSO password rotation interval is set to 60 days.
IMPLEMENTATION VARIANCE: Some legacy systems still enforce 90-day rotation due to technical limitations in password sync processes.
All system and application passwords must be stored and transmitted securely.
- Where possible, passwords should be stored in a hashed format using a salted cryptographic hash function (SHA-256 or stronger NIST compliant standard).
- Passwords that must be stored in non-hashed format must be encrypted at rest pursuant to the requirements in Data Protection.
BROKEN LINK: Data Protection policy link non-functional since site restructure.
- Transmitted passwords must be encrypted in flight pursuant to the requirements in Data Protection.
Each information system automatically requires users to change passwords at a pre-determined interval as determined by the system owner and/or Security, based on the criticality and sensitivity of the data contained within the network, system, application, and/or database.
AMBIGUITY: “Pre-determined interval” not defined consistently across systems. Ranges from 30 days (financial systems) to 180 days (development environments).
- Passwords are inactivated immediately upon an employee’s termination (refer to the Employee Termination Procedures in HR policy).
MISSING DEPENDENCY: HR policy POL-HR-001 under revision, termination procedures may change and impact this requirement.
- All default system, application, and Vendor/Partner-provided passwords are changed before deployment to production.
- Upon initial login, users must change any passwords that were automatically generated for them.
- Password change methods must use a confirmation method to correct for user input errors.
- All passwords used in configuration scripts are secured and encrypted.
- If a user believes their user ID has been compromised, they are required to immediately report the incident to the Security team.
- In cases where a user has forgotten their password, password reset procedures provided by the IdP shall be followed. The exact process depends on the system or application. If help is needed, users shall contact IT Support or Security
PROCESS GAP: No escalation procedure defined when both IT Support and Security are unavailable (after hours, weekends).
An approved password manager is used for to store or share non-critical business application passwords that are not integrated with our primary IdP through SSO.
- The password manager locally encrypts the password vault with the user’s master password before synchronising to the cloud.
- The master password must follow the password requirements listed above.
- MFA must enabled in the password manager configuration.
- Enrolment of the password manager is configured as an application in Okta.
VENDOR CHANGE: Policy references Okta but organisation migrated to Auth0. Password manager integration may need reconfiguration.
- An automated process/tool is implemented to ensure compromised passwords or common dictionary words are not used as passwords. This is currently implemented in Okta.
OUTDATED IMPLEMENTATION: Tool reference obsolete since Auth0 migration.
Single Sign On
- CloudCore selected Okta as its primary Identity Provider (IdP) to control user access to systems and business applications.
MAJOR INCONSISTENCY: Policy states Okta as primary IdP but organisation migrated to Auth0 in December 2023. Multiple references throughout policy are outdated.
Single sign-on (SSO) should be used whenever possible instead of local authentication. This centralised approach improves user experience and simplifies access management.
SSO is configured via industry standard SAML protocol between the IdP (Okta) and the target application.
CloudCore will not configure SSO to target applications unless they score a “B” rating or higher on the Qualys SSL Labs benchmark.
Security team is responsible for the administration of the IdP / SSO system, including user and access provisioning. Security team may delegate administrative privilege to a subset of the system, such as a specific application.
Multi-factor Authentication
Multi-factor authentication (MFA) is a standard control used by CloudCore to provide strong access control to critical systems and applications, and should be enabled whenever possible.
CloudCore implements Okta for MFA.
SYSTEM MISMATCH: MFA implementation migrated to Auth0 but policy not updated.
!!! important
**Approved MFA methods include:**
- Push notification delivered through the Okta mobile app (default and preferred for end-user access)
- Hardware MFA token (required for the root user of AWS accounts)
- A unique cryptographic certificate tied to a device
- Time-based One-Time Password (TOTP) delivered through a mobile app, such as Google Authenticator
- One-time passcode delivered through SMS text message (if it is the only supported option)
- Secure physical facility (if the system or application can only be accessed at that location)
SECURITY CONCERN: SMS-based MFA listed as acceptable method despite NIST SP 800-63B deprecating SMS for authentication. Policy needs updating to reflect current security standards.
Role Based Access Control (RBAC)
By default, user access is granted based on the user’s job function / role. For example:
- Developer
- Security
- IT
- Administrative
- Marketing / Sales
INCOMPLETE DEFINITION: Role definitions not linked to specific permissions or systems. Actual RBAC implementation may differ from policy intent.
This is defined as user groups in .
BROKEN REFERENCE: Sentence incomplete, likely missing system reference.
Access to sensitive data and production customer data is highly restricted and further defined in its own section.
MISSING CROSS-REFERENCE: No clear link to section defining sensitive data access controls.
DOCUMENT STATUS: This policy contains multiple outdated references and implementation gaps identified during routine review. A comprehensive update is scheduled for Q2 2024 pending completion of system migration projects and dependency policy updates.
COMPLIANCE IMPACT: Current implementation may not fully align with policy statements. Risk assessment required to determine compliance gaps and remediation priorities.