Access Control Proposal – Integrated Distributors Incorporated

This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

11 October 2021

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

Get custom essay

83 writers online

Proposal Statement

Integrated Distributors Incorporated (IDI) will establish particular necessities for safeguarding data and information systems against unauthorised entry. IDI will effectively communicate the necessity for data and information system access management.


Information safety is the protection of data against unintended or malicious disclosure, modification or destruction. Information is an important, useful asset of IDI which must be managed with care. All info has a price to IDI. However, not all of this information has an equal worth or requires the same degree of protection.

Access controls are put in place to protect information by controlling who has the rights to use different info resources and by guarding towards unauthorised use. Formal procedures must control how access to information is granted and the way such access is changed. This coverage also mandates a standard for the creation of robust passwords, their safety and frequency of change.


This policy applies to all IDI Stakeholders, Committees, Departments, Partners, Employees of IDI (including system assist workers with access to privileged administrative passwords), contractual third parties and brokers of the Council with any type of entry to IDI’s information and data methods.


Access management guidelines and procedures are required to manage who can access IDI information resources or systems and the related entry privileges. This policy applies always and ought to be adhered to every time accessing IDI info in any format, and on any gadget.


On event business info may be disclosed or accessed prematurely, accidentally or unlawfully. Individuals or firms, with out the proper authorisation and clearance may intentionally or by accident gain unauthorised entry to enterprise data which can adversely affect day to day enterprise.

This coverage is meant to mitigate that risk. Non-compliance with this coverage may have a big effect on the efficient operation of the Council and will result in financial loss and an lack of ability to provide necessary services to our prospects.

Applying the Policy – Passwords / Choosing Passwords

Passwords are the primary line of defence for our ICT methods and together with the person ID assist to ascertain that individuals are who they declare to be. A poorly chosen or misused password is a safety danger and will impression upon the confidentiality, integrity or availability of our computers and methods.

Weak and strong passwords

A weak password is one which is definitely discovered, or detected, by people who discover themselves not alleged to realize it. Examples of weak passwords embody words picked out of a dictionary, names of kids and pets, automobile registration numbers and easy patterns of letters from a pc keyboard. A robust password is a password that is designed in such a means that it’s unlikely to be detected by people who find themselves not alleged to know it, and troublesome to work out even with the help of a Protecting Passwords

It is of utmost significance that the password remains protected at all times. Do not use the same password for systems inside and outside of labor.

Changing Passwords

All user-level passwords have to be changed at a most of every ninety days, or whenever a system prompts you to vary it. Default passwords should also be changed instantly. If you turn out to be conscious, or suspect, that your password has turn into known to another person, you should change it immediately and report your concern to IDI Technical Support. Users must not reuse the same password inside 20 password adjustments.

System Administration Standards

The password administration process for particular person IDI systems is well-documented and out there to designated people. All IDI IT techniques shall be configured to implement the next: Authentication of particular person customers, not teams of customers – i.e. no generic accounts. Protection as regards to the retrieval of passwords and safety details. System entry monitoring and logging – at a user stage.

Role management in order that features may be performed with out sharing passwords. Password admin processes have to be correctly controlled, secure and auditable.

User Access Management

Formal user access control procedures must be documented, carried out and kept updated for each application and data system to make sure authorised user entry and to prevent unauthorised access. They should cover all stages of the lifecycle of user access, from the preliminary registration of recent users to the ultimate de-registration of customers who now not require entry. These should be agreed by IDI. User access rights have to be reviewed at regular intervals to make certain that the appropriate rights are still allotted. System administration accounts should only be offered to customers that are required to carry out system administration tasks.

User Registration

A request for entry to IDI’s computer systems must first be submitted to the Information Services Helpdesk for approval. Applications for entry must solely be submitted if approval has been gained from Department Heads. When an worker leaves IDI, their access to pc systems and information should be suspended at the shut of business on the employee’s last working day. It is the duty of the Department Head to request the suspension of the entry rights by way of the Information Services Helpdesk.

User Responsibilities

It is a user’s responsibility to forestall their userID and password being used to gain unauthorised access to IDI systems.

Network Access Control

The use of modems on non- IDI owned PC’s linked to the IDI’s community can critically compromise the safety of the community. The regular operation of the network must not be interfered with.

User Authentication for External Connections

Where remote access to the IDI community is required, an application must be made through IT Helpdesk. Remote access to the network have to be secured by two issue authentication. Supplier’s Remote Access to the Council Network Partner companies or third party suppliers must not be given details of tips on how to access IDI ’s community without permission. All permissions and access strategies have to be managed by IT Helpdesk. Operating System Access Control Access to operating methods is controlled by a safe login course of.

The entry control outlined in the User Access Management section and the Password section above should be applied. All access to operating methods is through a novel login id that might be audited and may be traced again to every individual person. The login id must not give any indication of the extent of entry that it offers to the system (e.g. administration rights). System directors will have to have particular person administrator accounts that will be logged and audited. The administrator account must not be utilized by people for normal daily activities.

Application and Information Access

Access within software program functions have to be restricted using the security measures built into the individual product. The IT Helpdesk is responsible for granting entry to the information inside the system.

Policy Compliance

If any person is found to have breached this coverage, they might be subject to IDI’s disciplinary procedure. If a legal offence is taken into account to have been dedicated further motion could additionally be taken to help within the prosecution of the offender(s). If you don’t understand the implications of this policy or how it may apply to you, seek advice from IT Helpdesk.

Policy Governance

The following table identifies who inside [Council Name] is Accountable, Responsible, Informed or Consulted with regards to this coverage. The following definitions apply:

  • Responsible
  • Head of Information Services, Head of Human Resources
  • Accountable
  • Director of Finance etc.
  • Consulted
  • Policy Department
  • Informed
  • All IDI Employees, All Temporary Staff, All Contractors.

Review and Revision

This coverage will be reviewed as it’s deemed acceptable, but no less frequently than each 12 months.

Key Messages

All users should use robust passwords.
Passwords have to be protected at all times and have to be modified no much less than each ninety days. User access rights have to be reviewed at common intervals. It is a user’s duty to forestall their userID and password getting used to gain unauthorised entry to IDI methods. Partner agencies or 3rd celebration suppliers must not be given particulars of tips on how to access the IDI network with out permission from IT Helpdesk. Partners or 3rd party suppliers must contact the IT Helpdesk before connecting to the IDI network.

Cite this page

Access Control Proposal – Integrated Distributors Incorporated. (11 October 2021). Retrieved from

"Access Control Proposal – Integrated Distributors Incorporated" StudyScroll, 11 October 2021,

StudyScroll. (2021). Access Control Proposal – Integrated Distributors Incorporated [Online]. Available at: [Accessed: 10 June, 2023]

"Access Control Proposal – Integrated Distributors Incorporated" StudyScroll, Oct 11, 2021. Accessed Jun 10, 2023.

"Access Control Proposal – Integrated Distributors Incorporated" StudyScroll, Oct 11, 2021.

"Access Control Proposal – Integrated Distributors Incorporated" StudyScroll, 11-Oct-2021. [Online]. Available: [Accessed: 10-Jun-2023]

StudyScroll. (2021). Access Control Proposal – Integrated Distributors Incorporated. [Online]. Available at: [Accessed: 10-Jun-2023]

Don't use plagiarized sources. Get your custom essay..

get custom paper

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy.