Access Control Document
Access Control Document
Access Control Document
Unknown
Document Summary:
Policy ID
Revision History
1. Overview This document outlines access control guidelines and procedures for
managing access to the following technology and devices within the Network
Operations Center (NOC):
• Routers
• Firewalls
• Switches
• Servers
• ACI
• DNAC
• CUCM
• HX
• Umbrella
• DUO
• AMP
• IT Service Management (ITSM) & Network Management System (NMS)
tools
2. Access Control Policies for Specific Devices
• Access to servers within the NOC will be controlled based on the principle
of least privilege.
• Server access will be limited to system administrators, network engineers,
and relevant support personnel.
• Access to ITSM and NMS tools will be granted to authorized NOC personnel
responsible for network monitoring and management.
• Access permissions will be assigned based on job roles and responsibilities.
• Usage and access to these tools will be logged and monitored regularly to
detect any unauthorized activities.
3. Access Control Procedures
a. Access Provisioning i. Requests for access to these devices and tools must be
submitted through a formal access request process. ii. Access requests will
require appropriate approvals from supervisors or department heads.
4. Responsibilities