Account and Credential Management Policy

Control 5 Control 6
Applicable Safeguards: 5.1 5.2 5.3 5.4 5.5 5.6 6.1 6.2

1. Purpose

Establish requirements for managing user accounts, service accounts, and credentials to ensure proper identity governance and access control across [ORGANIZATION]'s information systems.

2. Scope

This policy applies to all user accounts, service accounts, shared accounts, and associated credentials for all [ORGANIZATION]'s information systems, applications, and services.

3. Policy

3.1 Account Lifecycle Management

3.1.1

A centralized account management process shall be established covering the complete lifecycle: request, approval, provisioning, review, modification, and deprovisioning of accounts.

3.1.2

Account creation shall require documented authorization from the user's manager and, for privileged accounts, from [CUSTOMIZE: CISO/IT Director].

3.1.3

Account deprovisioning shall occur within [CUSTOMIZE: 24 hours] of personnel separation (termination, resignation, or end of contract).

3.1.4

Accounts inactive for [CUSTOMIZE: 45/60/90] days shall be automatically disabled. Disabled accounts not reactivated within [CUSTOMIZE: 30] days shall be deleted.

3.1.5

All account provisioning, modification, and deprovisioning actions shall be logged and auditable.

3.2 Password and Credential Requirements

3.2.1

Passwords shall meet the following minimum requirements: minimum [CUSTOMIZE: 12/14/16] characters in length, not match a list of known-compromised passwords, not contain the username or common dictionary words, and be changed immediately if compromise is suspected.

3.2.2

Unique credentials shall be required for each user. Shared accounts are prohibited except where technically unavoidable, in which case they shall be documented with compensating controls.

3.2.3

Service account credentials shall be managed through a secrets management solution, rotated at least [CUSTOMIZE: quarterly/annually], and not embedded in source code.

3.2.4

Default credentials on all systems and applications shall be changed before deployment to production.

3.3 Multi-Factor Authentication

3.3.1

Multi-factor authentication (MFA) shall be required for: all remote access connections, all privileged account access, access to Confidential and Restricted data, cloud service administrative consoles, and VPN connections.

3.3.2

MFA methods shall use at least two of: something you know (password), something you have (token, smart card, phone), or something you are (biometric).

3.3.3

SMS-based MFA is discouraged. Authenticator applications, hardware tokens, or FIDO2/WebAuthn are preferred.

3.3.4

MFA shall be enforced for all externally-accessible applications within [CUSTOMIZE: 6/12] months of this policy effective date.

3.4 Access Reviews

3.4.1

User access rights shall be reviewed at least [CUSTOMIZE: quarterly/bi-annually] by the account owner's manager to verify continued appropriateness.

3.4.2

Privileged access shall be reviewed at least [CUSTOMIZE: quarterly] by [CUSTOMIZE: CISO/IT Security Team].

3.4.3

Access review findings requiring remediation shall be addressed within [CUSTOMIZE: 14/30] days.

4. Compliance

4.1

Compliance with this policy is mandatory for all personnel within its scope. Compliance will be monitored through periodic audits, automated controls, and management review.

4.2

Exceptions to this policy must be documented with a business justification, approved by [CUSTOMIZE: CISO/Security Team], and reviewed at least annually.

5. Enforcement

5.1

Violations of this policy may result in disciplinary action up to and including termination of employment or contract, and may result in civil or criminal penalties where applicable law has been violated.

5.2

[ORGANIZATION] reserves the right to audit compliance with this policy at any time, with or without notice.

6. Review and Revision

6.1

This policy shall be reviewed at least annually by [CUSTOMIZE: CISO/Policy Owner] and updated as necessary to reflect changes in the threat landscape, regulatory requirements, or organizational structure.

6.2

All revisions shall be documented with version number, date, author, and description of changes.

Policy Approval

Approved By

[CUSTOMIZE]

Title

[CUSTOMIZE]

Date

[CUSTOMIZE]

Document Control

Version: [CUSTOMIZE: 1.0]
Effective Date: [CUSTOMIZE]
Last Reviewed: [CUSTOMIZE]
Next Review: [CUSTOMIZE]
Classification: Internal