3.1 Access Control and Termination Policy

Purpose and Scope

This Access Control and Termination Policy defines requirements for access and removal of access to Sord data, systems, facilities, and networks. From time to time, Sord may update this policy and implement different levels of security controls for different information assets, based on risk and other considerations. This policy is guided by security requirements specific to Sord including applicable laws and regulations.

This policy applies to all Sord assets or approved devices utilized by personnel acting on behalf of Sord or accessing its applications, infrastructure, systems or data. All personnel are required to read, accept, and follow all Sord policies and plans.

Access Control Requirements

Principle of Least Privilege

Sord adheres to the principle of least privilege, specifying that users of Sord systems will be given minimum access to data and systems based on job function, business requirements, or need-to-know for that specific user.

Administrative access to production servers and databases is restricted based on the principal of least privilege to senior management and engineers who have a job function and business need for such access.

Access to systems and applications must be controlled by a secure log-on procedure to prove the identity of the user.

Unique Accounts

Users of Sord systems and applications will be provided with unique credentials (IDs, keys, etc.) that can be used to trace activities to the individual responsible for that account. Shared user accounts shall only be utilized in circumstances where there is a clear business benefit and when user functions do not need to be traced. Shared account password should only be stored in a Sord approved password manager.

Password Security

Unique accounts and passwords are required for all users. Passwords must be kept confidential and not shared with multiple users. Where possible, all user and system accounts must have a minimum of eight characters including alpha (upper and lower case) and one numeric character. All accounts must use unique passwords not used elsewhere.

Rotation Requirements

If a password is suspected to be compromised, the password should be rotated immediately and the security team should be immediately notified.

Storing Passwords

Passwords must only be stored using a Sord approved password manager. Sord does not hard code passwords or embed credentials in static code.

Multi-Factor Authentication

When available, multi-factor authentication should be used. Multi-factor authentication must be used for access to company email, version control tool and cloud infrastructure.

Onboarding Procedures

In order to onboard new personnel, the following steps should be taken and documented:

  1. Any Sord devices provided to the new hire must be inventoried in accordance with Sord policy.

  2. A new hire email or ticket is sent to the appropriate team to inform them of new personnel.

  3. IT/Engineering and the new personnel’s manager documents a checklist of accounts and permission levels needed for that hire.

  4. The applicable team sets up each user with the appropriate access.

  5. All of the onboarding processes should be appropriately documented via ticketing or other document management tools.

Offboarding Procedures

In order to offboard an employee or contractor, the following steps must be taken:

  1. An offboarding email or ticket is sent to IT/Engineering when personnel has been terminated or resigned informing them of the team members’ last day.

  2. IT/Engineering goes through and documents the appropriate revocation checklist to revoke access to Sord systems and applications within 24 hours of the last day with the company or sooner if necessary.

  3. Any Sord devices provided must be collected and accounted for in accordance with Sord policy.

  4. All of the offboarding processes should be appropriately documented via Sord ticketing or other document management tools.

Changes to Access

Requests for changes to access level(s) such as in the case of a change in job duties, must be documented and approved by the appropriate manager.

A documented request must be sent to the appropriate department when an employee or contractor role changes to evaluate whether access privileges should be changed, or when accounts are no longer required and user access rights should be reviewed and reallocated as necessary prior to changes being made.

Such changes must be tracked using the Sord ticketing or other document management tools.

Quarterly Access Reviews

A team manager reviews, audits, and documents user accounts and associated privileges of at least high-risk and critical vendors at least quarterly to ensure that access is restricted appropriately.

Exceptions

Sord business needs, local situations, laws, and regulations may occasionally call for an exception to this policy or any other Sord policy. If an exception is needed, Sord management will determine an acceptable alternative approach.

Enforcement

Any violation of this policy or any other Sord policy or procedure may result in disciplinary action, up to and including termination of employment. Sord reserves the right to notify the appropriate law enforcement authorities of any unlawful activity and to cooperate in any investigation of such activity. Sord does not consider conduct in violation of this policy to be within an employee’s or contractor’s course and scope of work.

Any personnel who is requested to undertake an activity that he or she believes is in violation of this policy must provide a written or verbal complaint to his or her manager or any other manager of Sord as soon as possible.

The disciplinary process should also be used as a deterrent to prevent employees and contractors in violating organizational security policies and procedures, and any other security breaches.

Responsibility, Review, and Audit

Sord reviews and updates its security policies and plans to maintain organizational security objectives and meet regulatory requirements at least annually. The results are shared with appropriate parties internally and findings are tracked to resolution. Any changes are communicated across the organization.

This document is maintained by Jonathan Gautsch.

This document was last updated on 03/27/2024.

Last updated