IT300 Accounts Policy

Effective Date:  07/20/2021

Owner:  PPAC

Team Members:  PPAC

1.0            PURPOSE

1.1              The purpose of this policy is to establish procedures and guidelines for the administration of computing accounts that facilitate access to or on behalf of Baker College information resources.

2.0           SCOPE DETAIL

2.1             This policy is applicable to those responsible for the management of user accounts or access to shared information or network devices. Such information can be held within a database, application, or shared file space. This policy covers departmental accounts as well as those managed centrally.

3.0           DEFINITIONS

AD

Active Directory defining structure which allows access to Baker College resources.

Alumni

Student whom receives diploma or certificate of a BC program

AUP

Acceptable Use Policy

EAS

The Enterprise Application Services team

ISS

The Infrastructure Security and Support team.

IT

Information Technology

ITSC

The Information Technology Solution Center team

Least Privilege

The principle means giving to an account only those privileges which are essential to perform its intended function.

Non-Domain Accounts

Non-AD accounts that may or may not be used by Baker employees to manage other systems within the enterprise.

PCN

Personnel Control Number - every job title is assigned a specific PCN that allows proper access to be granted, based on campus, department, division, etc.

SLA

Service Level Agreement defines the level of service expected by a customer from a supplier.

SME

Subject Matter Experts are the individuals responsible for documenting instructions and reviewing the compatibility of a resource with the College’s systems.

System Administrator

Administrator of all Networking Infrastructure whether it’s Network Hardware or Servers

TSS

The Technology Services and Support team.

UID

User Identity

4.0           GUIDELINES

4.1              All information that Baker College deems as protected information, is to be stored on servers that require user authentication. Authentication is critical because it is the process by which a system confirms that a person or device really is who or what it is claiming to be and through which access to the requested resource is authorized. Strong authentication protocols help both to protect personal and organizational information and prevent misuse of organizational resources. Authenticating to any Baker College system constitutes full acceptance of the terms and conditions of the Acceptable Use Policy.

4.2             Baker Domain Accounts (UID)

4.2.1       Passwords

a.)              Complexity

i.)               Must have at least 8 characters and include 3 of the following 4 character types: upper case, lower case, numerals and special characters.

ii.)              Must not match any of the previous 5 passwords.

b.)              Faculty, staff, and vendor account passwords expire after 90 days.

c.)              If there is a reason to believe that any account has been jeopardized, the password must be changed immediately and both the ITSC and the account’s supervisor informed.

4.2.2      Life cycle

a.)              Baker College uses a formal account management process to create, manage, and remove user accounts.

b.)              Accounts must be unique and cannot be recycled.

c.)              A Supervisor may request access to an individual’s electronic records once an account is terminated.

d.)              Users who are existing students and/or alumni, and staff may receive a new account in the event of employment ending with the college.

4.2.3       Baker Email Account Usage

a.)              All official correspondence to/from the college will use an official Baker College email address and required formatting.

b.)              All Baker College email users are responsible for the information received and are required to monitor their email account on a regular basis.

c.)              All Baker College email users who redirect their official Baker College email address to another address may do so at their own risk. The College will not be responsible for handling email by other email service providers. emails lost during redirection does not absolve users from responsibilities associated with communication sent to their official Baker College email address.

4.2.4      Account Permissions

a.)              When possible, applied via PCN or AD group membership using the principle of least privilege.

b.)              Manually enabled permissions where applicable.

c.)              Accounts that transition to another department / role should be audited.

4.3             Non Baker Domain Accounts (All non AD accounts- application specific)

4.3.1        Passwords

a.)              Default passwords are prohibited.

b.)              Must be changed in accordance with respective procedures or triggering event(s) (e.g. staffing changes, security breach).

c.)              Complexity

i.)               Where applicable, follow the AD complexity requirements.

4.3.2       Life cycle

a.)              Account lifecycles must be SME defined for all non-domain accounts.

b.)              Accounts must be unique and cannot be recycled.

4.3.3       Account Permissions

a.)              Granted and maintained by SME using the principle of least privilege.

b.)              Auditing.

i.)               Accounts that transition to another department / role should be audited.

ii.)              Application specific access should be audited.

4.3.4      Temporary account access (Guest Access/Vendor)

a.)              Temporary account access might be provided for the following:

i.)               WiFi, computer access, and access to secure physical areas.

b.)              Temporary account access will require but is not limited to the following:

i.)               Minimum password length, username requirement, and short life cycle.

5.0           RESPONSIBILITIES

5.1              IT

5.1.1         The role of Baker College Information Technology is to ensure the IT environment and additional products and services are used to support the institution while striving to achieve the IT SLA’s.

5.1.2        The SME shall be responsible for maintaining a process to audit and manage accounts for any given application.

5.2             Supervisors of the employee

5.2.1        Request and approve additional access for all accounts.

5.3             Admissions

5.3.1        Verify the student’s information is accurate.

5.4             Human Resources

5.4.1        Verify staff or faculty information is accurate.

5.4.2       Assign and maintain applicable PCN’s.

5.5              ITSC

5.5.1        After an account has been compromised:

a.)              Verify the compromised password has been changed.

b.)              Inform the appropriate parties.

5.6             End User

5.6.1        The end user is responsible for understanding all Federal and State regulations that apply to their role(s).

5.6.2       Usage should adhere to all guidelines as specified by the AUP, student handbook, and employee handbook.

Details

Article ID: 134296
Created
Fri 9/10/21 4:51 PM
Modified
Mon 9/26/22 12:04 PM

Related Articles (1)

Defines the structure and purpose of policy & procedure utilization by the Baker College Information Technology Department.