Responsible Office: IT Services
Policy Officer: VP for Finance and Administration
Scope:
|Faculty
|Staff
|Student
Approved By: President's Council
Approved Date: 4/27/2022
Effective Date: 4/27/2022
Category: Institutional
Description/Purpose:
The purpose of this policy is to ensure access to the university information technology network by authorized persons as intended by University leadership, and the Department of Information Technology Services. This policy defines the levels of intended access by user type (role) and authorizes the Department of Information Technology Services to monitor for, detect and take actions to remedy violations of the Logical Access Policy.
Details:
I. PURPOSE AND APPLICATION
The purpose of this policy is to ensure access to the university information technology network by authorized persons as intended by University leadership, and the Department of Information Technology Services. This policy defines the levels of intended access by user type (role) and authorizes the Department of Information Technology Services to monitor for, detect and take actions to remedy violations of the Logical Access Policy.
II. SCOPE
This policy applies to all employees, faculty, vendors and partners at Saint Francis University.
III. IMPLEMENTATION
The University reserves the right to monitor and manage access control on its networks to prevent unauthorized access or misuse of network resources or data loss according to University policies, and local, state or federal laws, and to take other actions as necessary.
IV. STATEMENT OF POLICY AND PROCEDURE
A logical access framework will be established, maintained, and periodically audited to detect or prevent any violations of intended access as defined herein.
- The university will follow implemented on and off boarding procedures informing all respective departments including IT of changes in work status for all users.
- University leadership and human resources will enforce appropriate procedures for maintaining logical intended access and will take or prescribe appropriate action to avoid unauthorized access to university systems.
- Logical intended access will be periodically monitored by IT for compliance.
A. Intended Access by User Type
User Type |
Password Policy |
Account Expiration |
Notes |
Admin Account |
90 Days |
None |
Administrative accounts must also comply with the privileged user access policy |
W2 Employees |
180 Days |
None |
All employees on university payroll |
Adjunct Faculty |
180 Days |
One Year |
All adjunct faculty |
Student Workers |
180 Days |
730 Days/ 2 Years |
All student worker accounts should follow the same onboarding and off-boarding procedure as other W2 employees. |
Retired/ Emeritus |
180 Days |
None |
All accounts must be approved by HR, and reviewed by HR at least annually. |
Agency Staff |
180 Days |
180 Days Maximum |
Agency staff should include within their on-boarding the length and termination date of the contract |
Vendor Accounts |
180 Days |
Expiration of Vendor Contract |
All vendor accounts must be validated by the department lead, manager, supervisor, or IT prior to its creation. |
Contractor |
180 Days |
Expiration of Contract |
1099 contractors should include within their onboarding the length and termination date of the contract |
Augment Staff |
None |
30 Days |
Temporary staff to augment a particular project or campus activity. Accounts are not specific to the user, and passwords are set to reset on the first login. |
Test Accounts |
None |
30 Days |
Test accounts are to be created through the resolution of a service ticket, the passwords to these accounts are to be stored in a password vault. |
Service Accounts |
None |
None |
Service account are to be created through the resolution of a service ticket, passwords are to be stored in a password vault, and accounts are also set to have passwords never expire. |
B. Password Policy
- Users shall conform to the following standards when creating a password:
- Passwords must be at least 8 characters in length
- Password expiration complies with intended access specified above
- Users cannot reuse any of the last 5 used passwords
- Accounts will be locked for 15 minutes after 10 failed login attempts
- Passwords must meet complexity requirements (having a single character using 3 of the following 4 criteria)
- Upper Case Letter(s)
- Lower Case Letter(s)
- Number(s)
- Symbol(s)
- Passwords shall not be written down by the user
- Passwords shall not be communicated with other account information in any written communication. Passwords may be communicated through either a secondary communication method or in a separate communication without any identifications or labels of this being a password.
C. Account Management
Account Creations |
All account creations should be the result of a service ticket either through appropriate onboarding processes, or direct requests from department lead, manager, supervisor, university HR, or IT. Test accounts may be requested by an appropriate member of the IT team, but must also follow the standard account creation process through the ticketing system. |
Access Changes |
Account changes should be the result of a service ticket either through a direct request from department lead, manager, supervisor, university HR, or IT. Test accounts may be changed by an appropriate member of the IT team, but must also follow the standard account creation process through the ticketing system. |
Unlocking Accounts |
Account lockouts will last for no longer than 15 minutes. However, users may request their account be unlocked through contacting the Support Center and following the normal ticketing process. |
Password Resets |
Users may contact the Support Center for password resets, and following the normal ticketing process. |
Account Extensions |
An automated email message will be delivered to the owner of an expiring account through the last 10 days of availability. Extensions to these accounts may be requested by the department lead, manager, supervisor, university HR, or IT office to the Support Center, and a ticket will be generated. Account extensions may not exceed 180 days. |
Disabling Accounts |
Accounts will be disabled within 24 hours of the request either through appropriate offboarding processes, or direct request from department lead, manager, supervisor, university HR, or IT.
Audit findings the cyber security office will notify the university HR of any audit findings where either HR shows a user as active, and IT shows the user as inactive, or vice versa. After 2 periodic reviews, if no actions are taken and there has been no activity on the audited accounts, IT will perform a long term decommission of the account.
Expired Accounts Accounts that have been expired for 90 day or more will be automatically disabled and set for standard decommissioning.
Expired Passwords Accounts with an expired password and inactivity for 1 year or more will be automatically set for long term decommissioning. |
Standard Decommissioning Process |
Disabled accounts will be held within the system for 90 days. Then afterward, a change request will be drafted, and executed including the names of the accounts that will be permanently deleted. |
Long Term Decommissioning |
Accounts placed into long term decommissioning will be disabled and held in this container for 1 year, then placed into the appropriate standard decommissioning container for deletion after 90 days. |
D. User Responsibilities
- User IDs, usernames, and passwords must not be shared with others.
- Users shall be made aware of and required to implement security procedures for protecting equipment, media, and printed information from unauthorized use.
- Following Clear-Screen, Clean-Desk procedures (desk cleared and data secure when desk unattended) when leaving their work areas unattended.
- Understand that no IT nor university personnel will ever ask a user for their password, and any such actions are prohibited through this policy.
V. KEYWORDS AND DEFINITIONS (in alphabetical order)
"Network" - refers to the computing resources owned and operated by Saint Francis University.
"Clean Screen / Desk Procedures" - refers to ensuring that data used during work at a workstation is not visible by unauthorized persons while the workstation is unattended.
VI. RELATED POLICIES, FORMS AND RESOURCES
A. Related Policies
"Logical Access Control"
"Information Security Policies"
VII. POLICY REVISION HISTORY
|