02 – Authorized User Identification & Provisioning Policy
02 – Authorized User Identification & Provisioning Policy
Prepared by: [Name ----------------]
Organization: [company name]
1. Purpose
This policy establishes the framework for identifying, approving, and provisioning users, devices, and processes that require access to organizational resources. It ensures compliance with CMMC AC. L1‑3.1.1, supports secure onboarding and role assignment, and mandates timely deprovisioning. It also requires that all accounts and devices be documented in the System Security Plan (SSP) and linked to supporting SOPs for audit readiness.
2. Scope
This policy applies to:
- All employees, contractors, and authorized third parties requiring system access.
- All devices (Windows, macOS, Linux, laptops, mobile, servers) connecting to enterprise networks.
- All service accounts and automated processes requiring authorization.
3. Roles & Responsibilities
- Policy Owner: Oversees provisioning processes, ensures compliance, and reports status to leadership.
- HR & Managers: Initiate onboarding requests, validate business need, and approve access levels.
- IT Security Team: Create identities in IAM platforms (e.g., Entra ID, Google IAM), assign roles via RBAC, enforce device compliance through MDM/Intune, and configure Conditional Access.
- System Owners: Validate service account requirements and approve exceptions.
- Users: Operate only with authorized accounts and report anomalies promptly.
4. Policy Statements
- All users must be uniquely identified before access is granted.
- Accounts must be provisioned through approved IAM workflows.
- Devices must meet compliance requirements (enrollment, encryption, antivirus).
- Service accounts must be documented, approved, and restricted to least privilege.
- Access removal must occur within 24 hours of termination or role change.
- Shared accounts are prohibited unless explicitly approved and monitored.
5. Provisioning Workflow
Onboarding
- HR submits request → Manager approval → IT creates IAM account.
- Role assigned via RBAC matrix.
- Device enrolled in MDM/Intune.
Role Assignment
- Standard roles defined in RBAC policy.
- Privileged roles require PIM or equivalent approval.
Deprovisioning
- Triggered by HR separation notice.
- Account disabled within 24 hours.
- Device wiped via MDM/Intune if applicable.
6. Enforcement
- IAM (e.g., Entra ID, Google IAM): Identity provisioning, group membership, RBAC enforcement.
- MDM/Intune: Device compliance enforcement.
- RBAC/PIM: Role assignment and least privilege enforcement.
- Conditional Access: Block non‑compliant devices and enforce MFA.
7. Monitoring
- Automated joiner/mover/leaver logs maintained by IT Security.
- Device inventory maintained in MDM/Intune.
- Quarterly audit of service accounts documented in compliance repository.
8. References
- CMMC AC. L2‑3.1.1
- NIST SP 800‑171 Rev. 2
- DFARS 252.204‑7012
- Vendor technical reference guides (Microsoft, Google, AWS)
9. SSP, SOP, and Evidence Mapping
- SSP Mapping: Directly maps to CMMC AC. L2‑3.1.1 under User Identification & Provisioning.
- SOP Mapping: Supporting SOPs include User Onboarding SOP, RBAC Assignment SOP, Service Account SOP, and Deprovisioning SOP.
- Evidence Required:
- User Access Authorization Forms signed by Managers.
- Joiner/Mover/Leaver logs.
- Device inventory list exported from MDM/Intune.
- Service account approval records signed by System Owners.
- Quarterly audit reports stored in compliance repository.
End of Policy – AC 02
Date Created: [ / / ]
https://www.blogger.com/u/1/blog/post/edit/preview/4293395378927152575/8599171593827593266
Comments
Post a Comment