<section title="3.5. System Users"><subsection title="Objective"><paragraph
    title="3.5.1."


><![CDATA[<p>System users comply with information security policies and procedures within their agency.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="3.5.2."


><![CDATA[<p>This section covers the role that system users undertake with respect to information security.</p>]]></paragraph>
</block>
<block title="Types of system users"><paragraph
    title="3.5.3."


><![CDATA[<p>This section covers responsibilities for all system users i.e. users with general access (general users), and users with privileged access (privileged users).</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Responsibilities of system users"><paragraph
    title="3.5.4.R.01."

    tags="Governance"


><![CDATA[<p>If agencies fail to develop and maintain a security culture where system users are complying with relevant security policies and procedures for the systems they are using, there is an increased security risk of a system user unwittingly assisting with an attack against a system.</p>]]></paragraph>
<paragraph
    title="3.5.4.R.02."

    tags="Governance"


><![CDATA[<p>Security policies, procedures and mechanisms aim to cover all situations that may arise within an agency. However there may be legitimate reasons for a system user to bypass security policies, procedures or mechanisms. If this is the case, the system user MUST seek formal authorisations from the CISO or the ITSM (if this authority has been specifically delegated to the ITSM) before any actions are undertaken.</p>]]></paragraph>
<paragraph
    title="3.5.4.C.01."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="466"
><![CDATA[<p>All system users MUST comply with the relevant security policies and procedures for the systems they use.</p>]]></paragraph>
<paragraph
    title="3.5.4.C.02."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="467"
><![CDATA[<p>All system users MUST:</p><ul>
<li>protect account authenticators at the same classification of the system it secures;</li>
<li>not share authenticators for accounts without approval;</li>
<li>be responsible for all actions under their accounts; and</li>
<li>use their access to only perform authorised tasks and functions.</li>
</ul>]]></paragraph>
<paragraph
    title="3.5.4.C.03."

    tags="Governance"


    classification="All Classifications"
    compliance="Must"
    cid="468"
><![CDATA[<p>System users that need to bypass security policies, procedures or mechanisms for any reason MUST seek formal authorisation from the CISO or the ITSM if this authority has been specifically delegated to the ITSM.</p>]]></paragraph>
</block>
</subsection>
</section>
