A.9.2.3 Management of Privileged Access rights
User access rights to systems and data must be in line with defined and documented business needs and job requirements. Accurately managing user access rights addresses the issues of unintended or malicious modifications of information assets. Deficiencies in this area might allow unauthorized modifications that can lead to errors in reporting.
Administrators must determine that the following requirements are met:
- Access rights for privileged User IDs are restricted to least privileges necessary to perform the job.
- Assignment of privileges to individuals is based on job classification and function.
- Requirement for an authorization form that is signed by management and specifies required privileges.
- An automated access control system is being used.
To satisfy this control objective, administrators must monitor and verify that all user access to programs and data, and periodically review the user access to files and programs to ensure the users have not accessed items outside of their role. Administrators must select a sample of users who have logged in to reporting servers and review their access for appropriateness based on their job functions. As part of the procedures for the authorization and supervision of workforce members who work with information assets, TIBCO LogLogic access reports and alerts must be used to validate that the access has been configured correctly and appropriate access is maintained.
Reports and Filter Bloks
Use the following link or reference to see the A.9.2.3 reports and filter bloks: TIBCO LogLogic Reports and Filter Bloks for ISO/IEC 27002.