<section title="16.3. Privileged User Access"><subsection title="Objective"><paragraph
    title="16.3.1."


><![CDATA[<p>Only trusted personnel are granted privileged access to systems.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="16.3.2."


><![CDATA[<p>This section covers information relating specifically to personnel that are granted privileged access to systems.&nbsp;Refer also to <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15526">Section 16.4 – Privileged Access Management.</a></p>]]></paragraph>
</block>
<block title="Privileged access"><paragraph
    title="16.3.3."


><![CDATA[<p>Within this section, privileged access is, considered to be access which can give a system user:</p>
<ul>
<li>the ability to change key system configurations;</li>
<li>the ability to change control parameters;</li>
<li>access to audit and security monitoring information;</li>
<li>the ability to circumvent security measures;</li>
<li>access to all data, files and accounts used by other system users, including backups and media; or</li>
<li>special access for troubleshooting the system.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="16.3.4."


><![CDATA[<p>Additional information relating to privileged and system accounts, including monitoring, is contained in:</p>
<table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Restricting administrative privileges</strong></p>
</td>
<td style="text-align: center;">ASD</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/restricting-administrative-privileges" target="_blank">Restricting Administrative Privileges | Cyber.gov.au</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Use of privileged accounts"><paragraph
    title="16.3.5.R.01."

    tags="Access Control,Passwords"


><![CDATA[<p><span class="NormalTextRun SCXW209248292 BCX8">Inappropriate use of any </span><span class="NormalTextRun SCXW209248292 BCX8">aspect</span><span class="NormalTextRun SCXW209248292 BCX8"> of a system that enables a privileged user to override system or application controls can be a major co</span><span class="NormalTextRun SCXW209248292 BCX8">ntributory factor to failures,</span> <span class="NormalTextRun SCXW209248292 BCX8">information security incidents, or</span><span class="NormalTextRun SCXW209248292 BCX8"> system</span><span class="NormalTextRun SCXW209248292 BCX8"> breache</span><span class="NormalTextRun SCXW209248292 BCX8">s.</span></p>]]></paragraph>
<paragraph
    title="16.3.5.R.02."

    tags="Access Control,Passwords"


><![CDATA[<p><span class="TextRun SCXW134020089 BCX8"><span class="NormalTextRun SCXW134020089 BCX8">Privileged access rights allow for system wide changes to be made</span><span class="NormalTextRun SCXW134020089 BCX8">, </span><span class="NormalTextRun SCXW134020089 BCX8">as such</span><span class="NormalTextRun SCXW134020089 BCX8"> loggin</span><span class="NormalTextRun SCXW134020089 BCX8">g</span><span class="NormalTextRun SCXW134020089 BCX8">, monitoring</span><span class="NormalTextRun SCXW134020089 BCX8"> and strong change management </span><span class="NormalTextRun SCXW134020089 BCX8">practice</span><span class="NormalTextRun SCXW134020089 BCX8"> provide greater accountability and auditing capability.</span></span></p>]]></paragraph>
<paragraph
    title="16.3.5.C.01."

    tags="Technical,Access Control,Passwords"


    classification="All Classifications"
    compliance="Must"
    cid="1945"
><![CDATA[<p>Agencies MUST:</p>
<ul>
<li>ensure strong change management practices are implemented;</li>
<li>ensure that the use of privileged accounts is controlled and accountable;</li>
<li>ensure that system administrators are assigned, and consistently use, an individual account for the performance of their administration tasks;</li>
<li>keep privileged accounts to a minimum; and</li>
<li>allow the use of privileged accounts for administrative work only.</li>
</ul>]]></paragraph>
</block>
<block title="Privileged system access by foreign nationals"><paragraph
    title="16.3.6.R.01."

    tags="Access Control,Passwords"


><![CDATA[<p>As privileged users may have the ability to bypass controls on a system it is strongly encouraged that foreign nationals are not given privileged access to systems processing particularly sensitive information.</p>]]></paragraph>
<paragraph
    title="16.3.6.C.01."

    tags="Technical,Access Control,Passwords,NZEO"


    classification="All Classifications"
    compliance="Must Not"
    cid="1949"
><![CDATA[<p>Agencies MUST NOT allow foreign nationals, including seconded foreign nationals, to have privileged access to systems that process, store or communicate NZEO information.</p>]]></paragraph>
<paragraph
    title="16.3.6.C.02."

    tags="Technical,Access Control,Passwords"


    classification="All Classifications"
    compliance="Should Not"
    cid="1950"
><![CDATA[<p>Agencies SHOULD NOT allow foreign nationals, including seconded foreign nationals, to have privileged access to systems that process, store or communicate classified information.</p>]]></paragraph>
</block>
<block title="Security clearances for privileged users"><paragraph
    title="16.3.7.R.01."

    tags="Access Control,Passwords"


><![CDATA[<p>When frequent data transfers occur between systems of different classifications, having privileged users from the lesser system cleared to the classification of the higher system will assist in any actions that need to be taken resulting from any data spill.</p>]]></paragraph>
<paragraph
    title="16.3.7.C.01."

    tags="Technical,Access Control,Passwords"


    classification="All Classifications"
    compliance="Should"
    cid="1953"
><![CDATA[<p><span class="TextRun SCXW201738623 BCX8"><span class="NormalTextRun SCXW201738623 BCX8">Agencies</span><span class="NormalTextRun SCXW201738623 BCX8"> involved in frequent transfers of data from another system to their system with a lesser classification </span><span class="NormalTextRun SCXW201738623 BCX8">SHOULD </span><span class="NormalTextRun SCXW201738623 BCX8">ensure at</span><span class="NormalTextRun SCXW201738623 BCX8"> least one privileged user </span><span class="NormalTextRun SCXW201738623 BCX8">has a security clearance level </span><span class="NormalTextRun SCXW201738623 BCX8">commensurate</span><span class="NormalTextRun SCXW201738623 BCX8"> the classification of the higher system.</span></span></p>]]></paragraph>
</block>
</subsection>
</section>
