User Access Management
User Access Management
MANAGEMENT
Version 4.0
Version Control
Initial
1.0 Oded David
Version
Update
2.0 BDO according to 30/05/2020
ISO 27701
Shiran Annual
3.0 18/01/2022
Wolfman Review
Shiran Annual
4.0 Oded David 17/01/2023
Wolfman Review
Table of Contents
Table of Contents
Description
Scope
General
User Registration
Password Management
Description
● Formal procedures should be in place to control the allocation of user access rights to
information systems and services.
● The procedures should cover all stages in the life cycle of user access, from the initial
registration of new users to the final deregistration of users who no longer require
access to information systems and services.
● Special attention should be given, where appropriate, to the need to control access to
production and the allocation of privileged access rights, which allow users to override
system controls.
● This procedure relates to information in files, servers and workstations, software and
databases.
● Access rights granted to users should not contradict the principle of separation of duties.
Scope
● All Coralogix employees (classified, hourly, or business partners).
● All type of access to workstations, programs and other processes that may display,
contain or process PII/ePHI and/or credit card information.
● PCI-DSS - The Payment Card Industry Data Security Standard is an information security
standard for organizations that handle branded credit cards from the major card
schemes.
● The IT Manager - Ensure that access rights to the network (locally and remotely),
Production accounts and attribution to distribution groups (e-mail) are given in a formal and
documented manner according to this procedure.
General
When allocating access rights to various factors according to ISO 27001, 27701, HIPAA and
PCI-DSS the following guidelines will be up held:
1. For high level authentication techniques users will be assigned Multi Factor
Authentication (MFA), which require them to enter two of the three security "factor":
2. MFA require from all users who linked to their activities and be held responsible for their
actions; the use of group IDs should only be permitted where they are necessary for
business or operational reasons.
○ Each user will be granted access rights according to his affiliation to a specific
group, and according to the “need to know” principle that includes access both to
the data itself, as well as to the systems that store, process and transmit that
data. The level of access granted is appropriate to the business purpose, and is
○ Granting of access rights and access privileges will be carried out according to
this procedure – i.e. the process will involve a chain of approvals and will be
documented all establishes the identity of the user and the need to access the
ePHI and/or credit card information and reviewed.
○ The IT department will modify user access rights to ensure that the appropriate
level of access is granted at all times and will ensure the protection of any new
file or operating system component to prevent inappropriate, general access.
User Registration
User registration to Coralogix’s network will be done as follows:
1. Upon arrival of a new employee, the HR department will inform the IT Manager of a new
employee. The direct manager of the new employee will request, via email, to the HR
Manager and the IT team, to open a new user account and provide them with the
necessary access rights. The IT team may open a new account for the employee based
on HR's notification, however, in order to provide additional access rights to shares or
additional access to production, the VP R&D must be provided in an email from the
direct manager of the new hire.
3. In cases where the access rights should be given for a limited period (e.g. for the
duration of a project), the time period must be stated in the request. The direct manager
will inform the IT team and/or the VP R&D whenever these privileges are no longer
required.
4. In cases in which the privileges are not approved, a notification will be forwarded to the
direct manager.
5. The IT team will then forward details of user account and password (to network and to
other relevant systems) to new employees.
6. The employee will change password upon first logon (see paragraph 8 for password
policy details).
1. HR or the direct manager will immediately inform the IT Manager in order to have all of
the employees'; privileges revoked (especially in cases where an employee is terminated
due to reliability reasons or information security breaches).
3. Default accounts defined by vendors of the different systems (Guest, Anonymous), must
be removed or neutralized.
3. Username and passwords are personal and may not be transferred to another. Every
employee will be held accountable for his / her actions.
4. When a user forgets his/her password, they may request password reset from the IT
manager after clearly identifying himself.
5. The temporary password will be confidentially given to the user. The password will not
be given by a third party or by an unprotected text in Email. The users will acknowledge
receipt of password.
2. Password length will be 8 characters at least, composed of letters, numbers and other
special signs.
4. It is forbidden to create fixed passwords that could be related easily to the organization
or to the user (e.g. names, birthdays etc.).
6. Users will be required to change passwords to Coralogix’s network every 90 days, and
network system will keep history of 10 recent passwords.
3. The CISO will perform a quarterly access rights survey with the assistance of the IT
manager.
○ Access rights are allocated in accordance to business needs, i.e. there are no
excessive access rights.
6. Findings of this survey will be reported to the Information Security Steering Committee
and additional management members when necessary.
7. Review of access rights to the cloud environment will be performed by the cloud
manager twice a year.