Third Party Systems Account Access Control
Cloud systems can refer to any information system provided by a third party that handles campus data, where the data, system and infrastructure are not housed on premise, whether the service is paid for or free.
Examples of cloud-based systems architecture include, Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), or Infrastructure-as-a-Service (IaaS).
CSUSM Chief Information Security Officer
Third party applications that handle protected level 1 data and that do not use a campus-maintained directory authentication method.
Cloud-based information systems present numerous advantages over traditional on premise systems. However, this new method of information systems implementation presents new risks to the confidentiality, integrity and availability of the data these systems store. As such, it is necessary that the campus develop a method for managing and monitoring the accounts that grant access to the data these systems store.
- Where possible, cloud systems will use a campus-maintained directory and approved authentication method
- Access to cloud systems must follow CSU and campus standards for the request, authorizing and granting of access to protected information
- Access to cloud systems which do not use a campus-directory authentication method must follow the procedure below in order to ensure that access conforms to CSU and campus standards
- The creation, modification and deletion of user accounts that grant access to the system must be documented with the Information Security Office
- Administrative access, i.e. the authority to create, delete or modify user accounts must be limited to a minimal number of users
- Individuals with administrative access must be identified to the Information Security team
- Those with administrative access must be trained on the proper procedures to modify user accounts under this policy
- A user who requires access must complete the Third Party Access Control form, which notifies the Information Security Office of the request
- The Information Security Office logs the request, and forwards the request to the administrator
- The administrator grants the requested access
- For modification or removal of user accounts, the application administrator may complete the form on behalf of the user
- Annually, the Information Security Office will reconcile active user accounts in a given system with the systems user account log
- System user logs are retained by the Information Security Office for 12 months after the access review
- Access review results are retained by the Information Security Office for 12 months after the access review