Responsible Office: Office of Cybersecurity |
Last Review: 03/01/2025 Next Review: 03/01/2027 |
Contact: Chris Madeksho |
Phone: 901.448.1579 Email: mmadeksh@uthsc.edu |
Purpose
Access controls are designed to minimize potential exposure to the University of Tennessee Health Science Center (UTHSC) resulting from unauthorized use of Information Technology (IT) Resources and to preserve and protect the confidentiality, integrity, and availability of UTHSC networks, systems, and applications.
Scope
This standard applies to members of the UTHSC community who need to access UTHSC IT Resources.
Definitions
UTHSC Information Technology (IT) Resource – a broad term for all things related to information technology from a holistic point of view and covers all University- owned or managed information technology services, including cloud-based services, that users have access to.
Principle of Least Privilege – a given user account should be given only those privileges needed for it to complete its task.
Responsibilities
The Executive Leadership of ITS or designee is responsible for the overall Identification & Authentication (IA) program at UTHSC and ensures that the program is developed, documented, and disseminated to appropriate UTHSC entities in accordance with university policies.
Chief Information Security Officer (CISO) or designee is responsible for overseeing the IA program and consults with system owners to ensure effective procedures are implemented.
Data Owner or designee is responsible for approving requests for additions, changes, and deletions of access rights and privileges to data or information for individual users. The Data Owner will forward the approved requests to the system custodian for implementation.
System Custodian is responsible for the day-to-day administration of the system including the creation and management of system access accounts for authorized users.
UTHSC-ITS is responsible for creating the UTHSC authenticator that is based on the NetID and password for all members of the UTHSC community.
UTHSC-ITS is responsible for implementing the approved access rights and permission requests for all users to UTHSC IT Resources.
UTHSC Community given access to UTHSC IT Resources, share responsibility for ensuring the appropriate security of information and addressing security lapses or breaches. Any observed violation of the Information Security Program must be reported.
Standard
User Access
- Access to UTHSC IT Resources (e.g., data, systems, services, and networks) not categorized as a level zero (0) per IT0005-HSC-A-Data & System Categorization must be documented and limited to authorized persons whose job responsibilities require access, as determined by the Data Owner or their delegate.
- Access to UTHSC IT Resources (e.g., data, systems, services, and networks) not categorized as a level zero (0) per IT0005-HSC-A-Data & System Categorization, requires individual authentication to obtain access to such resources to protect from unauthorized use.
- Each UTHSC IT Resource must have a designated Data Owner responsible for overseeing, directing, and approving access to the system.
- The Data Owner, or delegate must hold a position of authority within UTHSC allowing the Data Owner, or delegate to approve all requests for access to the system.
- Each UTHSC IT Resource must have at least one individual serving in the role of system custodian.
- Requests for access rights and privileges to be granted, changed, or revoked must be made in writing to the Data Owner.
- At regular intervals, System custodians and Data Owners will execute a formal documented process to review users’ access rights.
- Failure to comply with these standards will result in a loss of access or other disciplinary actions, up to and including termination.
- Any anomalies found will be handled by the Security Incident Response Team in accordance with IT0017-HSC-A-Security Incident Response.
Administrative Access
- Access rights and privileges to UTHSC IT Resources not categorized as a C-I-A zero (0) will be granted following the principles of least privilege and need to know. These access rights and privileges will be restricted and controlled, with documented authorization.
- The allocation of special elevated (privileged) access rights (i.e., local administrator, domain administrator, super-user, root access) will be restricted and controlled, and documented authorization provided by the Data Owner, to the system’s custodian.
Physical Access
- Access to a physical location of IT Resources is restricted to authorized personnel having responsibility for installing or maintaining assets in these locations. Others requiring access are escorted and supervised by authorized personnel.
- All entry points affording access to physical location of IT Resources are locked at all times.
- Access to physical locations of IT Resources will be restricted by key, code, or electronic card. An auditable process for issuing keys, codes, and/or cards needs documentation.
- Physical locations of IT Resources are continuously monitored by surveillance equipment.
Remote Access
- Remote access to UTHSC IT Resources must have documented approval from the Owner of the UTHSC IT Resource.
- Remote access control procedures must provide appropriate safeguards through documented identification, authentication, and encryption techniques. Direct log-on to campus UTHSC IT Resources from off-campus locations is not allowed. A remote user must first authenticate to an authorized campus remote access service with strong encryption before logging into a campus computer. This restriction does not apply to authenticated user access to web applications or to systems designed for public access.
- A list of authorized campus remote access services is located at https://uthsc.edu/its/cybersecurity/remote-access.php.
- Any device and/or network connected remotely to the UTHSC network is subject to the policies, standards, and practices that apply to UTHSC-owned equipment, i.e., devices must be configured to comply with all UTHSC Security Policies and must accept any Network Access Control agents required for enforcement of these policies and standards.
- All computers connected to UTHSC internal networks remotely must use up-to-date anti-virus software.
- All computers connected to UTHSC internal networks remotely must have the latest operating system security patches applied.
- IT0311-HSC-A.02-VPN Access provides more specific requirements regarding the use of UTHSC’s VPN for remote access. Information about UTHSC’s VPN can be found on the VPN website.
Unauthorized Access or Disclosure
- Per IT0311-Information Technology Data Access Management and Recovery, unauthorized access to protected university data must be reported to the Chief Information Security Officer or the Office of Cybersecurity.
- Unauthorized access will be addressed according to IT0017-HSC-A-Security Incident Response.
Policy History
Version # | Effective Date |
1 | 04/18/2016 |
6 | 06/17/2020 |
7 | 11/18/2021 |
8 | 08/18/2022 |
9 | 03/01/2025 – new naming convention |
References
- IT0311-Information Technology Data Access Management and Recovery
- IT0005-HSC-A-Data & System Categorization
- IT0017-HSC-A-Security Incident Response
- IT0102-HSC-D-Physical Security of Information Resources and Related Facilities
- IT0311-HSC-A-.02-VPN Access
- IT0506-HSC-A–Authentication
- IT0506-HSC-A-01-Password Management and Complexity