Bulletin Board - Review and Comment
Step 1 of 3: Comment on Document
There are 3 steps in the submission process. You must complete all three steps in one session, otherwise your comments will be lost.
1. Use this
icon to open a comment box.
2. Type your feedback and then click the"Save Comment" button in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments, go to step 2 by clicking on the “Save and Continue” button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity or if you close your browser or go to a different tab/window and try to come back.
To ensure that your comments are received:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time.
-
DO NOT leave your submission unfinished. If you need to take a break, submit your current set of comments now and return later to make a further submission. You will receive a copy of your comments so that you can see what you have already said.
-
DO NOT exit from the interface until you have completed all three steps of the submission process. Simply saving a comment in the comment box does not mean it is submitted and if you exit the system, you will not be able to retrieve it later.
When you finalise your submission in step 3 your comments will be emailed to the Document Author with a copy to you, and to policy@mq.edu.au for record keeping purposes.
(1) This Policy outlines how IT Resources and User accounts are to be secured, in support of the Cyber Security Policy. (2) This Policy applies to University Staff and Third-Parties who: (3) Macquarie University (the University) is committed to maintaining a secure technology environment and as such, has established requirements to secure the University’s IT Resources. Establishing these requirements aims to decrease the likelihood of negative consequences impacting the confidentiality, integrity and availability of IT Resources. (4) User access provisioning, account management, and password allocation should only be performed by the Central IT team, in accordance with approved operational procedures. (5) Access to IT Resources should be controlled through a central identity management platform(e.g., Active Directory(AD) group membership). (6) Access to applications should be facilitated via Single-Sign-On(SSO), where possible. (7) User accounts must be configured with Multi Factor Authentication(MFA) and User accounts should be unique to an individual. (8) A User access provisioning process should be implemented to assign or revoke access to IT Resources. User access should be: (9) User access permissions should be reviewed for suitability by the Business Owner (or authorised delegate) or Cyber Security team, at the following cadences: (10) User access permissions should also be reviewed in response to one of the following: (11) User accounts should be locked for 30 minutes after 15 consecutive failed access attempts. (12) Access management systems must be configured to ‘deny by default’ unless explicit access is granted. (13) Both privileged and unprivileged access to IT Resources should be automatically disabled after 90 days of inactivity. (14) Privileged Users should maintain a Standard User account for their day-to-day non-privileged work and use a specific Privileged User account for any tasks that require elevated privileges. (15) Elevated/higher privileges should not be granted to a Standard User account. (16) The owner of a User Account will be held responsible for all actions undertaken by the account. (17) The use of shared User Accounts must be documented and an owner must be assigned to each shared User Account. (18) Where available, University approved password managers should be used. (19) IT Resources that manage/enforce passwords should be configured to enforce the following requirements: (20) Privileged account passwords must be randomly generated at build time and at any time the password is communicated. (21) Temporary passwords should adhere to the same requirements detailed in clause 19 and be set to expire after 24 hours. (22) Passwords must be changed in response to one of the following: (23) Password resets should be logged to provide an audit trail for any future investigation in accordance with the Logging, Monitoring and Alerting Policy. (24) Passwords should be securely stored within a University approved password manager. (25) Password generated by applications/systems should be shared via a secure and approved distribution method. (26) Passwords must not be shared with another individual. (27) Scripts, code, or macros should not contain passwords. (28) Passwords used for encryption keys should comply with the same minimum requirements as required by the Privileged User Accounts. (29) Passwords used to decrypt keys should only be verbally shared with authorised users. (30) IT Resources should be documented within an asset register, inclusive of the following information: (31) IT Resources not approved by the University should not be connected to the University’s corporate network. (32) IT Resources should be onboarded, maintained and offboarded in accordance with a defined asset management process. (33) Networks should be segmented and network zones classified different from public. (34) Network zones should be protected from the internet and Third-Party environments by perimeter controls including but not limited to a firewall and Access Control Lists (ACLs). (35) IT Resources attached to the University’s network must have anti-malware software installed. The software must: (36) Malware-infected IT Resources must be removed from the network until it is verified as virus-free. (37) All encrypted artefacts must be scanned for malware after decryption and before execution. (38) All artefacts obtained or downloaded must be scanned for malware before executing. (39) Locally mounted disks should be scanned by anti-malware software on a weekly basis. (40) University information should be encrypted in-transit and at-rest, in accordance with the Australian Signal Directorate (ASD) Approved Cryptographic Algorithms. (41) Internet-facing website validation should adhere to the criteria below: (42) System-to-system interfaces should adhere to the criteria below: (43) Encryption keys must adhere to the criteria below: (44) University records must be retained in accordance with the Records and Information Management Policy. (45) Information that is not required to be retained for regulatory or University purposes on printed material or in a digital format should be securely destroyed so that the information is not able to be recovered by unauthorised parties. (46) Destruction of University records should be approved by authorised Staff and documented. (47) Printed documents should be destroyed by using secure facilities provided by the University by: (48) Optical media and hard disks that contain University information should be securely deleted/wiped before being repurposed. (49) Optical media and hard disks should be physically destroyed before being disposed, by disintegration, incineration, pulverising, shredding, melting or through a AAA certified National Association for Information Destruction organisation, with a certificate of destruction. (50) Decommissioned, disposed and repurposed IT Resources should have: (51) Exemption from this Policy must be sought from the Chief Information Security Officer (CISO). (52) Breaches of this Policy will be managed in accordance with the applicable provisions of the Staff Code of Conduct and other relevant policy instruments. (53) IT Resources must be built/configured in accordance with, but not limited to, the following requirements: (54) IT Resources that handle Highly Sensitive information (refer Information Classification and Handling Procedure) must be built/configured in accordance with, but not limited to, the following requirements: (55) Firewalls must be built/configured in accordance with, but not limited to, the following requirements: (56) Firewall rule changes must be reviewed and approved by the Cyber Security team to determine if they meet one or more of the following conditions: (57) Web application environments should adhere to the following requirements: (58) Access to specific IT Resources should adhere to the requirements outlined within the following table: (59) A message that discourages unauthorised access and notifies the User of activity monitoring should be displayed before a User attempts to logon to an IT Resource, as outlined in the table below: (61) The following definitions apply for the purpose of this Policy:Computer and Network Security Policy
Section 1 - Purpose
Scope
Background
Section 2 - Policy
General Access Management
Account Management
Password Management
Requirement
Settings
Network Security
Malware
Encryption
IT Resource Decommissioning
Compliance and Exceptions
Section 3 - Procedures
Type
Requirements
Top of Page
IT Resource Type
Warning Message
Access to this system is restricted to authorised users only. Actions performed by users on this system are logged and monitored. Activities conducted on this system that contravene the University’s policies and procedures will be reported to the relevant authorities.
Section 4 - Guidelines
Top of PageSection 5 - Definitions