<section title="16.2. System Access"><subsection title="Objective"><paragraph
    title="16.2.1."


><![CDATA[<p>Access to information on systems is controlled in accordance with agency policy and the NZISM.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="16.2.2."


><![CDATA[<p>This section covers information on accessing systems for all system users.</p>]]></paragraph>
<paragraph
    title="16.2.3."


><![CDATA[<p>Additional information on privileged users can be found in <a title="Privileged user access" href="http://nzism.gcsb.govt.nz/ism-document#Section-15503">Section 16.3 - Privileged User Access </a>and additional information on security clearance, briefing and authorisation requirements can be found in <a title="Authorisations, Security Clearances and Briefings" href="http://nzism.gcsb.govt.nz/ism-document#Section-13391">Section 9.2 - Authorisations, Security Clearances and Briefings</a>.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Access control lists"><paragraph
    title="16.2.4.R.01."

    tags="Technical,Access Control,Passwords,System Access"


><![CDATA[<p><span class="TextRun Highlight SCXW58590109 BCX8"><span class="NormalTextRun SCXW58590109 BCX8">A </span><span class="NormalTextRun SCXW58590109 BCX8">clearly </span><span class="NormalTextRun SCXW58590109 BCX8">defined </span><span class="NormalTextRun SCXW58590109 BCX8">process </span><span class="NormalTextRun SCXW58590109 BCX8">will </span><span class="NormalTextRun SCXW58590109 BCX8">a</span><span class="NormalTextRun SCXW58590109 BCX8">ssist</span><span class="NormalTextRun SCXW58590109 BCX8"> an</span> <span class="NormalTextRun SCXW58590109 BCX8">organisation</span><span class="NormalTextRun SCXW58590109 BCX8"> in the </span></span><strong><span class="TextRun Highlight SCXW58590109 BCX8"><span class="NormalTextRun SCXW58590109 BCX8">consistent development</span></span></strong><span class="TextRun Highlight SCXW58590109 BCX8"><span class="NormalTextRun SCXW58590109 BCX8"> of access control lists for their systems.</span></span></p>]]></paragraph>
<paragraph
    title="16.2.4.C.01."

    tags="Technical,Access Control,Passwords,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1930"
><![CDATA[<p><span class="TextRun Highlight SCXW46013679 BCX8"><span class="NormalTextRun SCXW46013679 BCX8">Agencies</span> <span class="NormalTextRun SCXW46013679 BCX8">MUST</span><span class="NormalTextRun SCXW46013679 BCX8"> follow </span><span class="NormalTextRun SCXW46013679 BCX8">a</span> <span class="NormalTextRun SCXW46013679 BCX8">defined </span><span class="NormalTextRun SCXW46013679 BCX8">process for developing an access control list</span><span class="NormalTextRun SCXW46013679 BCX8">, such as </span><span class="NormalTextRun SCXW46013679 BCX8">described</span><span class="NormalTextRun SCXW46013679 BCX8"> in the table below</span><span class="NormalTextRun SCXW46013679 BCX8">.</span></span></p>
<table class="table-main">
<tbody>
<tr>
<td>Stage</td>
<td>Description</td>
</tr>
<tr>
<td>1</td>
<td><span class="TextRun SCXW185856795 BCX8"><span class="NormalTextRun SCXW185856795 BCX8">Establish groups of all system resources based on similar security </span><span class="NormalTextRun SCXW185856795 BCX8">objectives</span><span class="NormalTextRun SCXW185856795 BCX8">.</span></span></td>
</tr>
<tr>
<td>2</td>
<td><span class="TextRun SCXW90153667 BCX8"><span class="NormalTextRun SCXW90153667 BCX8">Determine</span><span class="NormalTextRun SCXW90153667 BCX8"> the information owner for each group of resources.</span></span></td>
</tr>
<tr>
<td>3</td>
<td>
<p><span class="TextRun SCXW99713774 BCX8"><span class="NormalTextRun SCXW99713774 BCX8">Obtain agreement from system owners.</span></span></p>
</td>
</tr>
<tr>
<td>4</td>
<td>
<p>Establish groups encompassing all system users based on similar functions or security objectives.</p>
</td>
</tr>
<tr>
<td>5</td>
<td>
<p>Determine the group owner or manager for each group of system users.</p>
</td>
</tr>
<tr>
<td>6</td>
<td>
<p>Determine the degree of access to the resource for each system user group<span class="TextRun SCXW83405406 BCX8"><span class="NormalTextRun SCXW83405406 BCX8">, incorporating the principal of least-privilege access</span></span>.</p>
</td>
</tr>
<tr>
<td>7</td>
<td>
<p>Decide on the level of access for security administration, based on the internal security policy.</p>
</td>
</tr>
<tr>
<td>8</td>
<td>
<p>Identify any classification, protective markings, and releasability indicators (such as NZEO or compartmented information).</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Enforcing authorisations on systems"><paragraph
    title="16.2.5.R.01."

    tags="Technical,Access Control,Passwords,System Access"


><![CDATA[<p><span class="NormalTextRun SCXW64295392 BCX8">Use of access controls on a system will </span><span class="NormalTextRun SCXW64295392 BCX8">assist</span><span class="NormalTextRun SCXW64295392 BCX8"> in enforcing the need-to-know principle. How </span><span class="NormalTextRun SCXW64295392 BCX8">access controls are set up in </span><span class="NormalTextRun SCXW64295392 BCX8">organisations</span> <span class="NormalTextRun SCXW64295392 BCX8">are becoming </span><span class="NormalTextRun SCXW64295392 BCX8">increasin</span><span class="NormalTextRun SCXW64295392 BCX8">g important to mitigate threats and minimise attack surfaces.</span></p>]]></paragraph>
<paragraph
    title="16.2.5.C.01."

    tags="Technical,Access Control,Passwords,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1924"
><![CDATA[<p>Agencies MUST have authorisation of system users enforced by access controls.</p>]]></paragraph>
</block>
<block title="Protecting compartmented information on systems"><paragraph
    title="16.2.6.R.01."

    tags="Technical,Access Control,Passwords,System Access"


><![CDATA[<p>Compartmented information is particularly sensitive and as such extra measures need to be put in place on systems to restrict access to those with sufficient authorisation, briefings and a demonstrated need-to-know or need- to access.</p>]]></paragraph>
<paragraph
    title="16.2.6.C.01."

    tags="Technical,Access Control,Passwords,System Access"


    classification="All Classifications"
    compliance="Must"
    cid="1927"
><![CDATA[<p>Agencies MUST restrict access to compartmented information. Such restriction MUST be enforced by the system.</p>]]></paragraph>
</block>
<block title="Access from foreign controlled systems and facilities"><paragraph
    title="16.2.7.R.01."

    tags="Technical,Access Control,Passwords,System Access,NZEO"


><![CDATA[<p>If a New Zealand system is to be accessed overseas it will need to be from at least a facility owned by a country that New Zealand has a multilateral or bilateral agreement with. NZEO systems can be accessed only from facilities under the sole control of the government of New Zealand and by New Zealand citizens.</p>]]></paragraph>
<paragraph
    title="16.2.7.C.01."

    tags="Technical,Access Control,Passwords,System Access,NZEO"


    classification="All Classifications"
    compliance="Must Not"
    cid="1920"
><![CDATA[<p>Agencies MUST NOT allow access to NZEO information from systems and facilities not under the sole control of the government of New Zealand and New Zealand citizens.</p>]]></paragraph>
<paragraph
    title="16.2.7.C.02."

    tags="Technical,Access Control,Passwords,System Access,NZEO"


    classification="All Classifications"
    compliance="Should Not"
    cid="1921"
><![CDATA[<p>Unless a multilateral or bilateral security agreement is in place, agencies SHOULD NOT allow access to classified information from systems and facilities not under the sole control of the government of New Zealand and New Zealand citizens.</p>]]></paragraph>
</block>
</subsection>
</section>
