ROI NET SOLUTION PVT LTD
Unit#810-811, 8 th Floor, Tower-B EMAAR Digital Greens Building, Golf Course Extn Road, Sector-61, Gurugram, Haryana - 122001 India
Author | |||
---|---|---|---|
Name | Role | Date of Preparation | Signature |
Pankaj Sharma | 01-Jan-2018 | PS | |
Reviewer(s) | |||
Name | Role | Date of Review | Signature |
Santosh Jaiswal | 04-Jan-2018 | SJ | |
Santosh Jaiswal | 01-Mar-2021 | SJ | |
Vivek Gupta | 01-Mar-2022 | VG | |
Vivek Gupta | 01-Mar-2023 | VG | |
Approver | |||
Name | Role | Date of Preparation | Signature |
Vivek Gupta | 05-Jan-2018 | VG | |
Vivek Gupta | 01-Mar-2021 | VG | |
Vivek Gupta | 31-Mar-2022 | VG | |
Vivek Gupta | 29-Mar-2023 | VG | |
Document Path | Version Number | Date of Release | |
1.0 | 05-Jan-2018 | ||
2.0 | 01-Mar-2021 | ||
3.0 | 31-Mar-2022 | ||
4.0 | 29-Mar-2023 | ||
Revision History | |||
Version Number | Date of Release | Section/ Page # Changed | Details of Changes |
1.0 | 05-Jan-2018 | - | First Release |
2.0 | 01-Mar-2021 | - | Second Release |
3.0 | 31-Mar-2022 | - | Third Release |
4.0 | 29-Mar-2023 | - | Fourth Release |
This document forms ROINET SOLUTION’s User Access Control & Account Management Policy in support of the IT Security Policy. Compliance with this Policy will enable consistent controls to be applied throughout the organization minimizing exposure to security breach, whilst allowing systems administration and technical support staff to conduct their activities within the framework of the company policies.
This policy applies to all user account and all other computing accounts provided to ROINET SOLUTION employees, contractors, trainees, etc. This policy is not limited to within ROINET SOLUTION premises, but applies to any access, remote or local, to any computing resources administered by ROINET SOLUTION
Where possible, systems are to be configured to force users to change their password at their first log on in accordance with the Password Policy.
The suspension of a user account can only be requested by the respective Reporting Officer with approval from HOD, HR Head of Department, Information Security Officer. Further, all users and privileged accounts are to be locked or disabled after 90 days or more of inactivity. All password resets are to be performed in accordance with the Password Usage and Management Policy. Non-permanent personnel (e.g., contractors, consultants) are not granted for account access and VPN/WIFI access.
Technical Support department is to restrict and control the allocation and use of system privileges on each computer platform. In particular, access to operating systems and applications is to be generally restricted to designated administrators and support staff who are associated with the management and maintenance of the respective platforms. Users are to be given specific account profiles and privileges as defined and authorized by their respective reporting officer or management in accordance with their particular function or role. When creating user-accounts, system administrators must take care to ensure that users are only granted access to systems and resources that have been approved and which are necessary for business purpose. User privileges are to be reviewed on a regular and frequent basis and withdrawn where the circumstances of those who have been granted privileges no longer warrant such access.
User-accounts are to remain active during the employment of the user at ROINET SOLUTION Separation Policy is followed by Technical Support & Human Resource when members of the staff leave employment. Administrators delete/disable user-accounts when the account holder has left organization employment or any disciplinary action has been taken by HR department.
User identification and authentication
All system users should have a unique identifier ("user-ID") for their personal use only.
This includes:
All user accounts must be assigned passwords which meet the standards in the Password Policy. In accordance with the Password Policy all users are required to change their initial log-on password the first time that they log onto a system where the system itself does not automatically enforce this requirement.
In accordance with the Acceptable Use Policy under no circumstances are users to attempt to access systems, applications or data which their user account does not naturally provide access to and for which they have not been granted specific permission.
Interactive sessions “lock out” the user after a defined period of inactivity (like 15 minute). Resumption of the interactive session require re-authentication.
This includes:
Limitation of connection time and location
Restrictions on connection times to be used for additional security for high-risk applications or remote communications capabilities. This includes:
User authentication for remote connections
Where appropriate and technically feasible, authentication methods should be used to control remote access to the network. All physical and logical access ports are disabled and where possible disconnected from the systems. Firewalls are to be configured to allow access to/from a specified DEVICE/IP/URL and or PORT.
Information access restriction
Access to information and application system functions should be restricted in accordance with the defined access control policy that is consistent with the overall organizational access policy. This could include any of the controls in this and other policies.
User Access rights violations are monitored regularly by the System Admin and Security Committee Member. Access Logs are monitored for this purpose. Automated Emails are generated and sent to designated members. All such violations shall be further discussed in the Security Committee Team Meetings and in the MRM Meetings.
Approval for third party account must be provided by the Head of Department from respective domain. The access should be restricted to minimum folders for better manageability.
When there is a need for collaborative working, shared areas are to be
created and accessed through the use of each user’s own user account.
However, project accounts may be permitted whereby members of a
‘group’ access the account through the use of a common (shared)
user-name and password.
Named custodians are to be appointed to manage temporary accounts
where these are used for temporary staff.
Network connection control
Capabilities of users to connect to the network should be appropriately restricted, consistent with access control policies and applications requirements. This includes:
Network routing control
Routing controls should be implemented to ensure that computer connections and information flows do not breach the access control policies of/for applications on the network. This includes:
Most network users will have access to the following types of network resources.
Requester | Shared Folder or Shared Network Drive | Type of Access Rights | Approval Requirement |
---|---|---|---|
New Employee | Department's Shared Drive & other public drive or folders, Intranet | Default Read permission | No |
Existing Employee & | Department's Shared Drive | Write & Modify | Reporting Officer |
Existing Employee & New Employee | Cross Functional Shared Drive | Any type of right | Reporting Officer & Cross Functional head |
Admin ID for all servers.
All applications, tools and utility programs are installed and managed by System Admin and no user is allowed to manage them. System Admin receive support requests from users with approvals from their Section Heads for such tasks. System Admin shall maintain a log of all such requests and activities performed.
Any employee found to have violated this policy could also be subject to disciplinary action, up to and including termination of employment.
The policy will continue to be in force unless superseded by a fresh policy. ROINET SOLUTION management reserves the right to amend, abrogate, modify, rescind / reinstate the entire Policy or any part of it at any time. .
ROINET SOLUTION IT Security Policy 1.0
Technical Support would be responsible for execution and enforcement of the policy and all ROINET SOLUTION processes and employees would be affected by the policy.
All ROINET SOLUTION employees
NA