diff --git a/Policies & Guidelines/IT/IT Security.md b/Policies & Guidelines/IT/IT Security.md index 732d3ce..93f2aa5 100644 --- a/Policies & Guidelines/IT/IT Security.md +++ b/Policies & Guidelines/IT/IT Security.md @@ -22,6 +22,13 @@ For direct server access ssh keys must be used instead of passwords. In addition Sometimes it becomes necessary for third party partners to access the servers (i.e. maintenance or support), in such a case second factor authentication is mandatory. The second factor authentication for third parties must be configured in such a way that only the head of IT can approve the access. +## Permissions + +It is strongly recommended to use the basic organization schematic and job description for every area as a basis to define user permissions. Based on the job descriptions and user tasks, groups should be generated with the appropriate permissions. The permission management through groups is preferred since it's much more verbose and shows a clear structure. While permissions on user basis are in some cases more convenient for quick permission handling they indicate that the actual job function compared to the organization layout is not coherent with the actual tasks that person is performing. Permission handling on user level is strongly advised against and re-structuring groups and creating new groups is much cleaner even if in some cases a group only has one account assigned. Permissions for accounts should also get re-evaluated on a regular basis in order to prevent non-active accounts or accounts whose job description changed to have permissions they no longer need. + +## Updates + +Updates are very important not only to implement the newest features but also to close potential security vulnerabilities. Updates should be tested in a testing environment and then migrated to the live environment. 2022-01-01 - Version 1.0