• Tidak ada hasil yang ditemukan

Password Policy

N/A
N/A
Protected

Academic year: 2024

Membagikan "Password Policy"

Copied!
11
0
0

Teks penuh

(1)

INSPIRING BUSINESS INNOVATION

Password Policy

Version: 2.0 Policy Code: DICT-QAP015

(2)

رورلما ةملك ةسايس Password Policy

Page 2 of 11

Table of Contents

Property Information ... 3

Document Control ... 4

Information ...4

Revision History ...4

Distribution List ...4

Approval ...4

Executive Summary ... 5

Introduction ...5

Objectives ...5

Entities affected by this Policy ...6

Policy Statement ... 7

Guidelines & Procedures Statements ...7

Responsibilities of the User Statements ...8

Policy Violation ...8

Conclusion ...9

Appendix ... 10

References ... 11

(3)

رورلما ةملك ةسايس Password Policy

Page 3 of 11

Property Information

This document is the property information of Imam Abdulrahman bin Faisal University - ICT Deanship.

The content of this document is intended only for the valid recipients. This document is not to be distributed, disclosed, published or copied without ICT Deanship written permission.

(4)

رورلما ةملك ةسايس Password Policy

Page 4 of 11

Document Control

Information

Title Classification Version Status

PASSWORD POLICY Public 2.0 validated

Revision History

Version Author(s) Issue Date Changes

1.0 Dr. Zahid – ICT, IAU 01 Jan 2018 Draft

1.1 Muneeb Ahmad – ICT, IAU 17 Sep 2019 Update

1.2 Lamia Abdullah Aljafari 6 Sep 2020 Update

2.0 Dr. Samer Bani Awwad 13 Sep 2021 Update

Distribution List

# Recipients

1 Legal Affairs 2 Website

3 Quality Assurance Department – DICT 4 System Management Department - DICT 5 Network Management Department - DICT 6 Applications Development Department - DICT

Approval

Name Title Date Signature

Dr. Khalid Adnan Alissa Dean of DICT 8th March 2022

(5)

رورلما ةملك ةسايس Password Policy

Page 5 of 11

Executive Summary

Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in a compromise of IAU entire network. The purpose of having a password policy is to ensure a more consistent measure of security for IAUs’ network and the information it contains. The implementation of this policy will better safeguard the personal and confidential information of all individuals and organizations affiliated, associated, or employed by the University. Additionally, this policy establishes a standard for creation of strong passwords, the protection of those passwords, and the frequency of change of passwords.

Introduction

University of Imam Abdulrahman bin Faisal significantly provides access authentication to online information technology resources such as email, institutional data, University websites, library and E- Learning portal, academic and personal data, cloud computing resources, and other sensitive services.

Passwords are the user’s 'keys' to gain access to University information and information systems. A compromise of these authentication credentials directly impacts the confidentiality, integrity, and availability of IT systems, and University as well as user information. This policy establishes minimum standards for the creation and protection of each person’s University password(s). All users accessing IAU IT resources are bound by the requirements as described in this policy, to create and secure their password(s).

Objectives

The following are the objectives of the policy:

1. Defend against unauthorized access of IAU systems that could result in a compromise of personal or institutional data

2. Ensure that ICT resources are used in an appropriate fashion, and support the university’s mission and institutional goals.

3. Encourage users to understand their own rights and responsibilities for protecting their passwords.

4. Protect the privacy and integrity of data stored on the University network.

(6)

رورلما ةملك ةسايس Password Policy

Page 6 of 11

Entities affected by this Policy

This policy applies to all persons who have, or are responsible for, an account on any system accessed on the University network or computer systems.

(7)

رورلما ةملك ةسايس Password Policy

Page 7 of 11

Policy Statement

Guidelines & Procedures Statements

General Guidelines:

1. Passwords must be changed every 90 days.

2. All passwords must meet the definition of a Strong password described below in the strong password construction guidelines section.

3. Each successive password must be unique. Re-use of the same password will not be allowed.

4. Any temporary password will expire at 23:59:59 of the date issued.

5. A user account will be temporarily locked for three (3) minutes after 3 consecutive failed logins:

a. Account Lockout Duration: 15 mins.

b. Account Lockout Threshold: 3.

c. Reset Account Lockout Counter: 30 mins.

6. The "reset password" process will be applied to users who logs in for the first time.

Poor, weak passwords have the following characteristics:

1. The password contains less than eight characters.

2. The password is a word found in a dictionary (English or foreign).

3. The password is a common usage word such as:

a. Name of family, pets, friends, co-workers, fantasy characters, etc.

b. Computer terms and names, commands, sites companies, hardware, software.

c. Birthdays and other personal information such as addresses and phone numbers.

d. Word or number patterns like aaabbb, 111222, zyxwvts, 4654321, etc.

e. Any of the above spelled backward like fesuoy, damha, etc.

f. Any of the above preceded or followed by a digit (e.g., secret1, 1secret).

(8)

رورلما ةملك ةسايس Password Policy

Page 8 of 11 Strong Password Construction Guidelines:

1. Are at least eight alphanumeric characters long 2. Passwords do not contain user ID

3. Contain no more than two identical characters in a row and are not made up of all numeric or alpha characters

4. Contain at least three of the five following character classes:

a. Lower case characters b. Upper case characters c. Numbers

d. “Special” characters (e.g. @#$%^&*()_+|~-=\`{}[]:";'<>/ etc) e. Contain at least eight alphanumeric characters.

Responsibilities of the User Statements

Users are responsible for assisting in the protection of the network and computer systems they use.

The integrity and secrecy of an individual's password is a key element of that responsibility. Everyone has the responsibility for creating and securing an acceptable password per this policy. Failure to conform to these restrictions may lead to the suspension of rights to University systems or other action as provided by University Policy.

Policy Violation

Anyone who violate this policy will be subject to any or all the following actions:

• Suspension of the university internet account/access.

• The referral of the case to the University Legal Department along with supporting evidence for an appropriate action.

• The case may be forwarded to the Communication & Information Technology Commission (CITC), Saudi Arabia who may initiate criminal investigation per the e-crimes regulations.

More information regarding these regulations may be found at the following link:

English Version:

http://www.citc.gov.sa/en/RulesandSystems/CITCSystem/Pages/CybercrimesAct.aspx

(9)

رورلما ةملك ةسايس Password Policy

Page 9 of 11 Arabic Version:

http://www.citc.gov.sa/ar/RulesandSystems/CITCSystem/Pages/CybercrimesAct.aspx

Conclusion

By enforcing the acceptable use policy, we aim to achieve the following outcomes:

1. Better informed university community regarding acceptable and unacceptable use of university ICT resources.

2. Responsible IAU community regarding the value and use of ICT resources.

(10)

رورلما ةملك ةسايس Password Policy

Page 10 of 11

Appendix

The following terms are used in this document:

Access - Connection of University, personal or third party owned devices to ICT Infrastructure facilities via a direct or indirect connection method.

Authorized User - An individual who has been granted access to University ICT services

Expiration - Date at which password for access to University systems is required to be changed meeting strong password standards.

Information Resources - Assets and infrastructure owned by, explicitly controlled by, or in the custody of the university including but not limited to data, records, electronic services, network services, software, computers, and Information systems.

(11)

رورلما ةملك ةسايس Password Policy

Page 11 of 11

References

1. Acceptable Use Policy

--- End of Document ---

Referensi

Dokumen terkait

The Alumni Unit and Career Development in the College of Medicine at Imam Abdulrahman Bin Faisal University has organized the “Saudi Board: from Scratch to Match” program in the

Aligning Clinical Nutrition Program Graduate Attributes CNPGA with those of Imam Abdulrahman Bin Faisal University Institutional Graduate Attributes GA.1 GA.2 GA.3 GA.4 GA.5

degree in CLS or MLT, BSc in biomedical sciences and BSc in Microbiology or Biochemistry from Imam Abdulrahman Bin Faisal University, or any other accredited university, with a

Doctor of Philosophy in Rehabilitation Sciences Admission requirements to the program: 1-A master degrees in one of the rehabilitation disciplines from Imam Abdulrahman Bin Faisal

2013 - 2019 4 Deans' award for academic achievement as a demonstrator Imam Abdulrahman bin Faisal University, College of Dentistry – May, 2012 5 Honors earned with the bachelor

The remaining general elective course shall be selected from relevant graduate courses offered in Imam Abdulrahman Bin Faisal University with consent of the supervisor and program

ميلعتلا ةرازو ةعماج ماملإا لصيف نب نمحرلا دبع بادلآا ةيلك ةيملاسلإا تاساردلا مسق MINISTRY OF EDUCATOION IMAM ABDULRAHMAN BIN FAISAL UNIVERSITY COLLEG OF ARTS Islamic Studies

Fellowship Professio nal Record: Beginning wit h the most recent Job Rank Place and Address of Work Date LRCURER Imam Abdulrahman bin Faisal University 2017 LRCURER Jadara