11.2.2 Privilege Management

User access rights to systems and data should be in line with defined and documented business needs and job requirements. Accurately managing user access rights addresses the issues of unintended or malicious modifications of information assets. Deficiencies in this area may allow unauthorized modifications that could lead to errors in reporting.

Administrators must determine that the following requirements are met:

  • Access rights for privileged User IDs are restricted to least privileges necessary to perform the job.
  • Assignment of privileges to individuals is based on job classification and function.
  • Requirement for an authorization form that is signed by management and specifies required privileges.
  • An automated access control system is being used.

To satisfy this control objective, administrators must monitor and verify that all user access to programs and data, and periodically review the user access to files and programs to ensure the users have not accessed items outside of their role. Administrators should select a sample of users who have logged in to reporting servers and review their access for appropriateness based upon their job functions. As part of the procedures for the authorization and supervision of workforce members who work with information assets, TIBCO LogLogic access reports and alerts should be used to validate that the access has been configured correctly and appropriate access is maintained.

Reports and Alerts

Use the following link/reference to see the 11.2.2 reports and alerts: TIBCO LogLogic Reports and Alerts Quick Reference.