| ๐ผ a. undertake due diligence processes before granting access to personnel. The use of contractors and temporary staffing arrangements may elevate the risk for certain roles; | | | | | no data |
| ๐ผ b. implementation of role-based access profiles which are designed to ensure effective segregation of duties; | | | | | no data |
| ๐ผ c. prohibiting sharing of accounts and passwords (with the possible exception of generic accounts, where prohibiting sharing of accounts and passwords is unavoidable due to technology constraints); | | 1 | 1 | | no data |
| ๐ผ d. changing default passwords and user names | | | | | no data |
| ๐ผ e. timely removal of access rights whenever there is a change in role or responsibility and on cessation of employment; | | | | | no data |
| ๐ผ f. session timeouts; | | | | | no data |
| ๐ผ g. processes to notify appropriate personnel of user additions, deletions and role changes; | | | | | no data |
| ๐ผ h. audit logging and monitoring of access to information assets by all users; | | 8 | 9 | | no data |
| ๐ผ i. regular reviews of user access by information asset owners to ensure appropriate access is maintained; | | | | | no data |
| ๐ผ j. multi-factor authentication for privileged access, remote access and other high-risk activities; | | 2 | 2 | | no data |
| ๐ผ k. generation, in preference to storage, of passwords/Personal Identification Numbers (PINs) where used to authorise high-risk activities (e.g. debit/credit card and internet banking transactions); | | | | | no data |
| ๐ผ l. two-person rule applied to information assets with the APRA-regulated entityโs highest level of sensitivity rating (e.g. encryption keys, PIN generation, debit/credit card databases). | | | | | no data |