Skip navigation

Procedure: Information Technology account management and access

Purpose

To establish the framework and procedures by which University Information Technology (IT) accounts are managed and secured, and set guidelines for the use of privileged accounts.

Definitions

Definitions of terms used in this document are provided in the overarching Policy (Information Technology Security Policy).

Procedure

  1. In alignment with the University's strategic plans, the University will provide access to information infrastructure and services to all members of the University community, enabling the continued excellence and performance in education, teaching and learning, and research.
  2. The University provides access to:
  1. all authorised users within the University community
  2. all network connecting devices authorised for connection, and that have been allocated an IP address within the University's IP Address range.
  1. Suspected or known security incidents must be reported to University Cyber and Digital Security and remediation is coordinated from that office.

University Responsibilities

  1. The University is responsible for:
  1. providing and maintaining authorised users with access
  2. suspending an authorised user's network access for breaches of policy, resulting from penalties or disciplinary action imposed under the Information Infrastructure and Services Rules 2015
  3. instructing any authorised users identified responsible for network connecting devices which have been blocked from network access and the obligations they must undertake before network access is restored
  4. authorising and providing non-ANU Entities with network access and determining the form of the network access
  5. ensuring all network access adheres to the obligations of the University's Access Agreement
  1. University responsibilities under this procedure are vested in Information Technology Services.

Owner Responsibilities

  1. System owners are responsible for:
  1. Security architecture and identity and access architecture within the systems that they manage
  2. providing appropriate network access to business areas under the control of the respective Budget Unit
  3. provision and ongoing management of user accounts for visitors
  4. ensuring authorised users acknowledge and abide by all relevant ANU policies and related documents
  5. conducting semi-annual reviews of privileged access and elevated access to ensure that access is still required for the users to perform their role. The Manager, Cyber and Digital Security will initiate semi-annual review process and report outcomes to the Director, ITS.
  6. ensuring users are provided with adequate training and support on the use of information infrastructure and the security of information assets
  7. identifying and managing disaster recovery and business continuity requirements within their area
  8. ensure that risk management, including risk assessment and mitigation, and change management processes, are undertaken with respect to the information technology within their area.

User Responsibilities

  1. Authorised Users are responsible for:
  1. respecting the rights of other users and the integrity of the network, systems and physical infrastructure
  2. observing and complying with all relevant policies, laws, regulations, and contractual obligations
  3. not connecting unauthorised network devices to the University’s network
  4. complying with security and password requirements set out in the Password Procedure
  5. maintaining an appropriate level of awareness and compliance with University policies, procedures, Rules and Standards governing IT and information assets, and completing any user training required by the system owners.

Privileged Access and Elevated Access Accounts

  1. Privileged Access users are users of a system/s with one or more of the following, and may include systems and database administrators:
  1. the ability to change key system configurations
  2. the ability to change control parameters
  3. access to audit and security monitoring information
  4. the ability to circumvent security measures
  5. access to data, files, and accounts used by other users, including backups and media
  6. special access for troubleshooting a system.
  1. Elevated Access users are users within a business system or application who have additional access via roles or functionality, who do not have Privileged Access. Elevated Access users may include supervisors or reviewers.
  2. Access to the University's computing resources, facilities and data is generally available to managers and administrative staff throughout the University. Least privilege access is provided initially to users by default; elevated access or privileged access is granted on the submission of an application form with delegate approval.
  3. A list of privileged account users is maintained by each system owner.
  4. Use of privileged accounts
  1. Staff requiring access to a system must have a genuine business requirement, verified by their manager, to access the system.
  2. Staff must only be given the privileges required to undertake their duties. Providing staff with privileged access when there is no requirement can pose a significant risk to the integrity of the system.
  3. Privileged accounts can potentially allow access to the entire system and strong authentication must be used, especially if the account provides access to financial, confidential, or otherwise sensitive information or data.
  1. Control of privileged accounts
  1. Privileged accounts must be controlled and accountable.
  2. Privileged accounts must be kept to a minimum and only used for essential administrative tasks.
  1. Supervisors of privileged accounts must ensure users are provided with adequate training and support on the use of privileged accounts and the security of information assets.
  2. Users of privileged accounts must ensure the security of the account and access, and that any risk is identified and reported.
  3. Users of privileged accounts must apply change management processes.
  4. Users of privileged accounts are responsible for maintaining an appropriate level of awareness and compliance with University policies, procedures, Statutes, Rules, and Standards governing access, information infrastructure, and elevated password requirements.

Deactivation and Expiration of Access

  1. The University is responsible for establishing and managing life cycles of user accounts for authorised users.
  2. Deactivation and/or expiration of access will occur when:
  1. a student or staff member leaves the University
  2. an auxiliary account is no longer associated with the University
  3. a user is found to have breached the ANU information technology policies and Rules governing appropriate usage of University information technology resources
  4. an account is no longer required/has reached its expiration date as advised on the University Email Account/Auxiliary Account Request Form.

Information

Printable version (PDF)
Title Information Technology account management and access
Document Type Procedure
Document Number ANUP_000709
Version 6
Purpose To establish the framework and procedures by which University Information Technology (IT) accounts are managed and secured, and set guidelines for the use of privileged accounts.
Audience Staff, Students, Affiliates, Alumni
Category Administrative
Topic/ SubTopic Information Technology - Security
 
Effective Date 8 Apr 2016
Review Date 10 Apr 2017
 
Responsible Officer Director, Information Technology Services
Approved By: Chief Operating Officer
Contact Area Information Technology Services
Authority Information Infrastructure and Services Statute 2012
Information Infrastructure and Services Rule 2015
AS ISO/IEC 27002:2015
Australian National University Act 1991
Australian Government Protective Security Policy Framework
Public Governance, Performance and Accountability Act 2013
Public Governance, Performance and Accountability Rule 2014
Australian Government Department of Finance and Deregulation Finance Circular No. 2009/08
Crimes Act 1914 (Cth)
Privacy Act 1998
Telecommunications Act 1997
Telecommunications Regulations 2001
Telecommunications (Interception and Access) Act 1979