Skip to main content

๐Ÿ’ผ 7 A regulated entity would typically deploy the following access controls:

  • Contextual name: ๐Ÿ’ผ 7 A regulated entity would typically deploy the following access controls:
  • ID: /frameworks/apra-cpg-234/c/7
  • Located in: ๐Ÿ’ผ Attachment C - Identity and access

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-c-2d29eb5b

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ a. undertake due diligence processes before granting access to personnel. The use of contractors and temporary staffing arrangements may elevate the risk for certain roles;
๐Ÿ’ผ b. implementation of role-based access profiles which are designed to ensure effective segregation of duties;
๐Ÿ’ผ c. prohibiting sharing of accounts and passwords (with the possible exception of generic accounts, where prohibiting sharing of accounts and passwords is unavoidable due to technology constraints);11
๐Ÿ’ผ d. changing default passwords and user names
๐Ÿ’ผ e. timely removal of access rights whenever there is a change in role or responsibility and on cessation of employment;
๐Ÿ’ผ f. session timeouts;
๐Ÿ’ผ g. processes to notify appropriate personnel of user additions, deletions and role changes;
๐Ÿ’ผ h. audit logging and monitoring of access to information assets by all users;78
๐Ÿ’ผ i. regular reviews of user access by information asset owners to ensure appropriate access is maintained;
๐Ÿ’ผ j. multi-factor authentication for privileged access, remote access and other high-risk activities;22
๐Ÿ’ผ k. generation, in preference to storage, of passwords/Personal Identification Numbers (PINs) where used to authorise high-risk activities (e.g. debit/credit card and internet banking transactions);
๐Ÿ’ผ l. two-person rule applied to information assets with the APRA-regulated entityโ€™s highest level of sensitivity rating (e.g. encryption keys, PIN generation, debit/credit card databases).