Account usage restrictions for specific time periods and locations shall be taken into account in the organisation's security access policy and applied accordingly.
Account usage restrictions for specific time periods and locations shall be taken into account in the organisation's security access policy and applied accordingly.
Privileged users shall be managed, monitored and audited.
Privileged users shall be managed, monitored and audited.
Access permissions, rights, and authorisations shall be defined, managed, enforced and reviewed.
Access permissions, rights, and authorisations shall be defined, managed, enforced and reviewed.
It shall be determined who needs access to the organisation's business-critical information and technology and the means to gain access.
It shall be determined who needs access to the organisation's business-critical information and technology and the means to gain access.
Access rights, privileges and authorisations must be restricted to the systems and specific information needed to perform the tasks (the principle of Least Privilege).
Access rights, privileges and authorisations must be restricted to the systems and specific information needed to perform the tasks (the principle of Least Privilege).
No-one shall have administrative privileges for routine day-to-day tasks.
No-one shall have administrative privileges for routine day-to-day tasks.
Where technically, operationally, and economically feasible—without compromising system integrity, safety, or compliance—automated mechanisms shall be implemented to manage user accounts on critical ICT and OT systems. Feasibility shall be determined based on system capabilities, integration potential, risk assessment, and business impact.
Where technically, operationally, and economically feasible—without compromising system integrity, safety, or compliance—automated mechanisms shall be implemented to manage user accounts on critical ICT and OT systems. Feasibility shall be determined based on system capabilities, integration potential, risk assessment, and business impact.
Separation of duties (SoD) shall be ensured in the management of access rights.
Separation of duties (SoD) shall be ensured in the management of access rights.
Privileged users shall be managed and monitored.
Privileged users shall be managed and monitored.