SCIO Access Control
SCIO Access Control
Document No.
Access Control Policy SCIO-SEC-301-00
Scope
The Statewide Information Security Policies are the foundation for information technology security
in North Carolina. The policies set out the statewide information security standards required by
N.C.G.S. §143B-1376, which directs the State Chief Information Officer (State CIO) to establish a
statewide set of standards for information technology security to maximize the functionality,
security, and interoperability of the State’s distributed information technology assets, including, but
not limited to, data classification and management, communications, and encryption technologies.
This policy covers all State information and information systems to include those used, managed, or
operated by a contractor, an agency, or other organization on behalf of the State. This policy applies
to all State employees, contractors, and all other users of State information and information systems
that support the operation and assets of the State. Use by local governments, local education
agencies (LEAs), community colleges, constituent institutions of the University of North Carolina
(UNC) and other executive branch agencies is encouraged to the extent allowed by law.
Responsibilities
All covered personnel who utilize State of NC IT resources are responsible for adhering to this policy
and any local Access Control requirements.
Role Definition
Agency The Agency Head, the Chief Information Officer (CIO), the Chief Information Security
Management Officer (CISO), or other designated organizational officials at the senior leadership level
are assigned the responsibility for ensuring that the goals and requirements of the Access
Control Policy are met. Responsible for ensuring that the approved administrative and
technical privacy controls are in place and effective. Responsible for educating employees
about their access control responsibilities.
Information The Information Security function is responsible for the protection of information and
Security information systems from unauthorized access, use, disclosure, disruption, modification,
or destruction in order to provide confidentiality, integrity, and availability
Agency Security The Agency Security liaison is responsible for ensuring that security risks are managed in
Liaison compliance with the State’s requirements by collaborating with organizational entities.
Liaisons are responsible for ensuring that the appropriate access controls are in effect for
agency information systems.
Covered Covered personnel are required to understand their security responsibilities and have the
Personnel requisite skills and knowledge to ensure the effective execution of the roles they are
assigned to reduce the risk of unauthorized access, use or modification of IT Resources
(theft, fraud or misuse of facilities).
DocuSign Envelope ID: 47E92340-69A8-41E6-ACF5-32E9F690D504
Document No.
Access Control Policy SCIO-SEC-301-00
Third Parties Third party service providers must ensure that all IT systems and applications developed
for the State conform to this and other applicable Enterprise Information Technology
Policies, Standards and Procedures. Non-conforming IT systems cannot be deployed
unless the purchasing entity and their contractor have jointly applied for and received, in
writing from the CIO or designee, notice that a specified exception will be permitted.
AC-1 – Policy
All agency information assets must meet the required security controls defined in this policy
document that are based on the National Institute of Standards and Technology (NIST) SP 800-53,
Security and Privacy Controls. This document addresses the requirements set forth by the State to
implement the family of Access Control security controls.
The State has adopted the Access Control security principles established in the NIST SP 800-53, “Access
Control” control guidelines as the official policy for this security domain. The “AC” designator identified
in each control represents the NIST-specified identifier for the Access Control family. The following
subsections in this document outline the Access Control requirements that each agency must
implement and maintain in order to be compliant with this policy and to ensure that logical and
physical access to information systems is sufficiently controlled. This policy shall be reviewed annually,
at a minimum.
The State and agencies are required to implement necessary controls for providing authorized access
and preventing unauthorized access to IT resources and information assets based on business and
security requirements. All users of State and agency systems with access to non-public data must
identify themselves and provide a means to authenticate their claimed identities appropriately for the
risk level of the system and/or transaction. The policy statements in this document address the
controls that will help to ensure that the State’s IT resources and information assets are properly
protected against unauthorized access, while meeting the access requirements for all authorized users.
Critical to achieving this objective is the implementation of controls that address each of the
requirements stated in this policy.
Access to State information technology assets shall be controlled and managed to ensure that only
authorized devices/persons have appropriate access in accordance with an agency’s business needs. All
computers that are permanently or intermittently connected to an agency’s network shall have an
approved credentials-based access control system. Regardless of the network connections, all systems
handling the State’s Restricted and/or Highly Restricted data shall employ approved authentication
credentials-based access control systems and encryption for data in transit. Access to State and Agency
systems shall be controlled by the following:
Document No.
Access Control Policy SCIO-SEC-301-00
Document No.
Access Control Policy SCIO-SEC-301-00
j. The default access method for files and documents is role-based access control (RBAC), however,
other methods to securely access files and documents may be used (e.g. attribute-based access
control (ABAC), lattice-based access control (LBAC), etc.).
k. Access rights of users in the form of read, write and execute shall be controlled appropriately and
the outputs of those rights shall be seen only by authorized individuals.
l. Access to restricted and/or highly restricted data shall be restricted to authorized individuals who
require access to the information as part of their job responsibilities.
m. Agencies shall modify an individual’s access to a State information technology asset upon a change
of employment or change in authorization, such as termination, a leave of absence or
temporary/permanent reassignment. An agency may change, restrict or eliminate user access
privileges at any time.
n. Only authorized system or security administrators or an authorized service desk staff shall be
allowed to enable or re-enable a user credential except in situations where a user can do so
automatically through challenge/response questions or other user self-service mechanisms.
o. All user credential creation, deletion and change activity performed by system administrators and
others with privileged access shall be securely logged and reviewed on a regular basis.
p. User credentials established for a non-employee/contractor must have a specified expiration date
unless a user credential without a specified expiration date is approved in writing by the agency
security liaison. If an expiration date is not provided, a default of thirty (30) days must be used.
q. Access control may need to be modified in response to the confidentiality, integrity or availability
of information stored on the system, if existing access controls pose a risk to that information.
r. In order to facilitate intrusion detection, information shall be retained on all logon attempts until
the agency determines the information is no longer valuable, or as required by law or the
standards of this policy.
s. All authorized users of administrative-access accounts shall receive appropriate training on the use
of those accounts.
t. There shall be a process for notifying account managers when system accounts are no longer
required, when users are terminated or transferred, or when individual information system usage
or need- to-know permission changes.
u. Agencies shall authorize access to information systems that receive, process, store, or transmit
Federal Tax Information (FTI) based on a valid access authorization, need-to-know permission, and
under the authority to re-disclosed FTI under the provisions of IRC 6103.
v. Agencies shall monitor the use of information system accounts. Agencies shall review accounts for
compliance with account management requirements at a minimum of annually for user accounts
and semi-annually for privileged accounts/roles. Privileged accounts are accounts with elevated
access and/or agency-defined roles assigned to individuals that allow those individuals to perform
certain functions that ordinary users of that system are not authorized to perform. These
DocuSign Envelope ID: 47E92340-69A8-41E6-ACF5-32E9F690D504
Document No.
Access Control Policy SCIO-SEC-301-00
privileged roles may include, for example, root access, system administrator access, key
management, account management, network and system administration, database
administration, and web site or server administration.
w. Establish a process for reissuing shared/group account credentials (if deployed) when individuals
are removed from the group, for example, RACF accounts that are reissued to different individuals.
x. All accounts are processed for records management, litigation hold and other similar information
disposition purposes prior to deleting, disabling or transferring.
y. Appropriate background checks shall be completed and adjudicated for unprivileged and privileged
access and accounts according to Federal and/or State designation procedures for those systems
that require it, for example, systems with FTI and Criminal Justice Information (CJI).
Document No.
Access Control Policy SCIO-SEC-301-00
Document No.
Access Control Policy SCIO-SEC-301-00
e. Firewalls shall control inbound and outbound network traffic by limiting that traffic to only that
which is necessary to accomplish the mission of the agencies. Firewall configuration, installation,
monitoring and filtering requirements are found in the System and Communications Protection
Policy SCIO-SEC-316, Section SC-7.
f. The information system shall enforce approved authorizations for controlling the flow of FTI within
the system and between interconnected systems based on the technical safeguards in place to
protect the FTI.
a. Agencies shall conduct information system support functions (e.g., system management,
programming, configuration management, quality assurance and testing, and network security)
with different individuals; and ensure security personnel administering access control functions do
not also administer audit functions.
b. Agencies shall monitor and review system usage for activities that may lead to business risks by
personnel who are able to quantify and qualify potential threats and business risks. Appropriate
controls and separation of duties shall be employed to provide review and monitoring of system
usage of personnel normally assigned to this task. Some events that should be monitored include
over utilization of bandwidth, un- authorized login attempts, and un-authorized attempts to make
changes to system settings.
c. System administration and system auditing shall be performed by different personnel.
e. System development and system change management shall be performed by different
personnel.
f. System operations and system security administration shall be performed by different
personnel.
g. If possible, security administration and security audit shall be performed by different personnel.
h. Agencies shall keep the responsibility for security audit separate from other audit duties.
i. Agencies shall identify, document, and segregate activities that require collusion to defraud (e.g.,
exercising a purchase order and verifying receipt of goods).
j. Separation of duties is mandatory for all financial applications where misuse could cause a direct
financial loss. Examples include, but are not limited to the following:
i. Check issuance
DocuSign Envelope ID: 47E92340-69A8-41E6-ACF5-32E9F690D504
Document No.
Access Control Policy SCIO-SEC-301-00
Document No.
Access Control Policy SCIO-SEC-301-00
c. The agency shall restrict privileged accounts on the information system to a limited number of
authorized individuals with a need to perform administrative duties. Privileged accounts, including
super user accounts, are typically described as system administrator for various types of systems.
i. Restricting privileged accounts to specific personnel or roles prevents day-to-day users from
having access to privileged information/functions.
ii. Agencies may differentiate in an application between allowed privileges for local accounts and
for domain accounts provided the agency retains the ability to control information system
configurations for key security parameters and as otherwise necessary to sufficiently mitigate
risk.
d. Information systems shall prevent non-privileged users from executing privileged functions to
include disabling, circumventing, or altering implemented security safeguards/countermeasures.
i. Privileged functions include, for example, establishing information system accounts,
performing system integrity checks, or administering cryptographic key management activities.
ii. Non-privileged users are individuals that do not possess appropriate authorizations.
iii. Circumventing intrusion detection and prevention mechanisms or malicious code protection
mechanisms are examples of privileged functions that require protection from non-privileged
users.
e. Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by
unauthorized entities that have compromised system accounts, is a serious and ongoing concern
and can have significant adverse impacts on agencies. Auditing the use of privileged functions is
one way to detect such misuse, and in doing so, help mitigate the risk from insider threats and the
advanced persistent threat (APT). Information systems shall do the following:
i. Audit the execution of privileged functions as described in the Audit and Accountability Policy,
SCIO-SEC-303, Section AU-2, Audit Events.
ii. Prevent non-privileged users from executing privileged functions; including disabling,
circumventing, or altering implemented security safeguards/countermeasures.
f. Administrators of multi-user systems, systems that allow for concurrent usage of the system by
multiple persons, must have at least two user credentials. One of these user credentials must
provide privileged access, with all activities logged; the other must be a normal user credential for
performing the day-to-day work of an ordinary user.
g. Users of information system accounts, or roles, with access to sensitive information, shall use non-
privileged accounts or roles when accessing non-privileged functions. This control enhancement
limits exposure when operating from within privileged accounts or roles.
Document No.
Access Control Policy SCIO-SEC-301-00
incorrect password is provided three (3) consecutive times, remote access systems shall drop the
connection.
b. The locked-out duration shall be at least thirty (30) minutes, unless the end user successfully
unlocks the account through a challenge question scenario or a system or security administrator or
an authorized service desk staff member re-enables the user’s account.
This is a government computer system and is the property of the State of North Carolina. This system
may contain U.S. Government information, which is restricted to authorized users ONLY. Unauthorized
access, use, misuse, or modification of this computer system or of the data contained herein or in transit
to/from this system may subject the individual to administrative disciplinary actions, criminal and civil
penalties. Users have no expectation of privacy. This system and equipment are subject to monitoring
to ensure proper performance of applicable security features or procedures. Such monitoring may result
in the acquisition, recording, and analysis of all data being communicated, transmitted, processed, or
stored in this system by a user. If monitoring reveals possible evidence of criminal activity, such evidence
may be provided to Law Enforcement Personnel. ANYONE USING THIS SYSTEM EXPRESSLY CONSENTS
TO SUCH MONITORING.
For systems that cannot accommodate the standard logon banner, the following 246-character
wording may be used:
This system is property of the State of North Carolina & is for authorized users ONLY. Unauthorized
access may result in disciplinary action, civil & criminal penalties. Users have no expectation of privacy.
USER EXPRESSLY CONSENTS TO MONITORING.
Document No.
Access Control Policy SCIO-SEC-301-00
a. The agency information system prevents further end user access to the system by initiating a
session lock after 15 minutes of inactivity or upon receiving a request from a user.
b. The agency information system shall retain the session lock until the user reestablishes access
using established identification and authentication procedures.
Document No.
Access Control Policy SCIO-SEC-301-00
Document No.
Access Control Policy SCIO-SEC-301-00
a. Access to the State Network and agency internal networks via external connections from local or
remote locations shall not be automatically granted with network or system access. Systems shall
be available for on- or off-site remote access only after an explicit request is made by the user and
approved by the manager for the system in question.
b. Agencies shall establish and document usage restrictions, configuration/connection requirements,
and implementation guidance for each type of remote access allowed.
c. Agencies authorize remote access to the information system prior to allowing such connections.
d. When unauthorized remote access is detected on State systems: (1) An alert shall be sent to
appropriate system and security personnel, and (2) an alert is sent every hour thereafter until the
device is removed from the network or authorized by the configuration management process.
e. Agencies shall require adequate security measures (e.g., virus and spam protection, firewall,
intrusion detection) on client computers prior to allowing remote or adequately protected virtual
private network (VPN) access. Access to the State Network is a privilege and shall be denied, at the
State CIO’s discretion, to clients attached to networks deemed unacceptably vulnerable.
f. All users wishing to establish a remote connection via the Internet to the agency’s internal network
must first authenticate themselves at a firewall or security device.
g. Remote access for system administration functions that originate from networks external to the
State Network, such as the Internet, must be accomplished, at a minimum, using multi-factor
authentication (MFA).
h. Remote access to systems for end users, specifically for access to either Restricted or Highly
Restricted data, shall be achieved using MFA technologies.
i. All users who require remote access privileges shall be responsible for the activity performed with
their user credentials. User credentials shall never be shared with those not authorized to use the
credential. User credentials shall not be utilized by anyone but the individuals to whom they have
been issued. Similarly, users shall be forbidden to perform any activity with user credentials
belonging to others.
j. Remote access shall be revoked at any time for reasons including non-compliance with security
policies, request by the user's supervisor, or negative impact on overall network performance
attributable to remote connections. Remote access privileges shall be terminated upon an
employee’s or contractor’s termination from service. Remote access privileges shall be reviewed
upon an employee’s or contractor’s change of assignments and in conjunction with other regularly
scheduled user account reviews.
k. Except for web servers or other systems where regular users are anonymous, users are prohibited
from remotely logging into any state computer system or network anonymously (for example, using
“guest” accounts). If users employ system facilities that allow them to change the active user ID to
gain certain privileges, such as the switch user (su) command in Unix/Linux, they must have initially
logged in with a user ID that clearly indicates their identity.
DocuSign Envelope ID: 47E92340-69A8-41E6-ACF5-32E9F690D504
Document No.
Access Control Policy SCIO-SEC-301-00
l. If an agency computer or network access control system is not functioning properly, it shall default
to denial of access privileges to users. If access control systems are malfunctioning, the systems
they support must remain unavailable until such time as the problem has been rectified.
m. Split tunneling shall be disabled for all VPN solutions.
n. Remote access to single-equipment hosts (e.g., agency servers) shall be permitted provided the
equipment requires authenticated access, is appropriately protected by a VPN, and prevents
onward connection to the State Network.
o. Users requiring telecommunications access, such as dial-up modem access, for “out of band”
management or special needs must obtain agency management approval.
Document No.
Access Control Policy SCIO-SEC-301-00
Document No.
Access Control Policy SCIO-SEC-301-00
j. Agencies shall conduct periodic war driving exercises in and around agency facilities to
detect unauthorized access points and ad hoc networks that are attached to the agency’s
network. Agencies shall remove and report through incident response procedures any
unauthorized devices that are found.
i. All wireless access to the State Network via an 802.11 wireless network shall be authenticated
by requiring the user to supply the appropriate credentials as supported by the Wi-Fi directly
or via the Extensible Authentication Protocol (EAP) extensions.
ii. Where a documented business case exists, user devices may authenticate using compliant
service accounts but must require a user to re-authenticate to the Wi-Fi once the user has
authenticated to the device.
iii. 802.1x credentials for individual users shall be deactivated in accordance with an agency’s
user management policy or within twenty-four (24) hours of notification of a status change
(for example, employee termination or change in job function).
iv. Agency approved guest access shall give users access to only the Internet and shall use a
captive portal that at least requires the guest users to agree to terms of service and states
user activity on the wireless network is monitored.
b. Agencies shall use FIPS 140-2 compliant encryption to protect wireless access to information
system. For a list of validated cryptographic modules and products, refer to the following
NIST publication: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm.
Document No.
Access Control Policy SCIO-SEC-301-00
and/or networks. Agencies shall protect state resources and information while using mobile
communication devices through the following requirements:
a. Agencies that allow mobile communication devices (personal or business owned) to connect to
state systems, such as email, shall require the following:
i. A minimum 4-digit numeric, user defined, personal identification number (PIN) that is
changed every 90 days.
ii. A time out of inactivity that is 10 minutes or less.
iii. If technically configurable, the ability to remotely erase the contents of the device, at the user’s
request, management request via a help desk service request, or by the user’s own action.
Agencies shall make end users aware they are accepting the risk of personal data being lost.
b. Disable wireless functionality (i.e., Wi-Fi or Bluetooth) on appropriate devices that have wireless
functionality (i.e., Wi-Fi or Bluetooth) when the device is not in use for an extended period of time.
c. Purge/wipe information from mobile devices based on 10 consecutive, unsuccessful device logon
attempts (e.g., personal digital assistants, smartphones and tablets). Laptop computers are
excluded from this requirement.
d. Agencies shall comply with legal and regulatory requirements associated with information that is
stored on the device, such as requirements for confidentiality, security and record retention.
e. When unauthorized connections are detected, i) an alert shall be sent to appropriate system
personnel, and ii) the device shall be isolated from the network.
f. Agencies shall ensure users adhere to the guiding principles and framework established in the
Statewide Acceptable Use Policy (AUP).
AC-19 (5) – Access Control for Mobile Devices – Full Device / Container-
Based Encryption (Moderate Control)
Agencies shall employ either full-device encryption or container encryption to protect the
confidentiality and integrity of information on agency provided mobile devices. Where technically
configurable, agencies shall encrypt all data stored on mobile devices.
Document No.
Access Control Policy SCIO-SEC-301-00
controlled by other governmental (Federal, State, or Local) organizations; and cloud computing
services that are accessed from agency information systems.
a. Access to restricted or highly restricted information from external information systems, other than
through a virtual private network (VPN) is prohibited.
b. Agencies may allow the use of personally-owned devices with access to FTI, without notification,
only for the following purposes:
i. Bring Your Own Device (BYOD) used to access e-mail, where all requirements in IRS 1075
Section 9.4.8 Mobile Devices are met.
ii. Remote access through a virtual desktop infrastructure (VDI) environment, where all
requirements in IRS 1075 Section 9.4.13 Virtual Desktop Infrastructure are met.
c. Use of non-agency-owned information systems, system components, or devices to process, store,
or transmit restricted or highly restricted data requires agency-pre-approval prior to
implementation.
d. Require that Cloud Service Providers (CSPs) configure systems such that access is consistent with
defined, documented, and approved user access requirements, roles and responsibilities and
account privileges and adhere to the following:
i. System accounts and access are reviewed at least monthly to ensure that only the
appropriate levels of access are allowed.
ii. Access is granted only to authorized personnel.
iii. Users’ access rights are limited to least privilege.
This control enhancement recognizes that there are circumstances where individuals using external
information systems (e.g., contractors) need to access agency information systems. In those situations,
agencies need confidence that the external information systems contain the necessary security
safeguards (i.e., security controls), so as not to compromise, damage, or otherwise harm agency
information systems. Verification that the required security controls have been implemented can be
DocuSign Envelope ID: 47E92340-69A8-41E6-ACF5-32E9F690D504
Document No.
Access Control Policy SCIO-SEC-301-00
Document No.
Access Control Policy SCIO-SEC-301-00
vi. These controls may be supplemented by operating-system-level controls (e.g., file and directory
access control lists and system audit logs).
e. This control is optional for LOW risk information systems.
Enforcement
Violations of this policy or failure to implement provisions of this policy may result in disciplinary
action up to and including termination, civil litigation, and/or criminal prosecution.
DocuSign Envelope ID: 47E92340-69A8-41E6-ACF5-32E9F690D504
Document No.
Access Control Policy SCIO-SEC-301-00
Material Superseded
This current policy supersedes all previous versions of the policy. All State agencies and vendors of the
State are expected to comply with the current implemented version of this policy.