{"id":43515,"date":"2020-06-24T08:06:32","date_gmt":"2020-06-24T15:06:32","guid":{"rendered":"https:\/\/policies.wsu.edu\/prf\/?page_id=43515"},"modified":"2026-02-20T16:22:13","modified_gmt":"2026-02-21T00:22:13","slug":"bppm-87-05","status":"publish","type":"page","link":"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-05\/","title":{"rendered":"87.05 Access Control and Authorization"},"content":{"rendered":"\n<h1 class=\"wp-block-heading wsu-font-size--xxmedium\">University Policies and Procedures Manual&nbsp;(previously Business Policies and Procedures Manual)<\/h1>\n\n\n\n<h2 class=\"wp-block-heading\">Access Control and Authorization<\/h2>\n\n\n<div class=\"wsu-row wsu-row--single\" >\r\n    \n<div class=\"wsu-column\"  style=\"\">\r\n\t\n\n<p><strong>UPPM 87.05<\/strong><\/p>\n<p><strong>For more information contact:<\/strong><br \/>\u00a0 \u00a0<a href=\"https:\/\/its.wsu.edu\/how-can-we-help-contact-its\/\">Information Technology Services<\/a><\/p>\n<hr \/>\n<div id=\"toc_container\">\n<h3>Contents<\/h3>\n<ul class=\"toc_list\">\n<li><a href=\"#One_0\">1.0 Overview and Purpose<\/a>\n<ul class=\"toc_list\">\n<li><a href=\"#One_1\">1.1 Information Assurance Policies Generally<\/a><\/li>\n<li><a href=\"#One_2\">1.2 Specific Policy Overview and Purpose<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#Two_0\">2.0 Applicability<\/a><\/li>\n<li><a href=\"#Three_0\">3.0 Roles and Responsibilities<\/a>\n<ul class=\"toc_list\">\n<li><a href=\"#Three_1\">3.1 Chief Information Officer<\/a><\/li>\n<li><a href=\"#Three_2\">3.2 Information Owners<\/a><\/li>\n<li><a href=\"#Three_3\">3.3 Office of Information Security and Assurance (OISA)<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#Four_0\">4.0 Requirements<\/a>\n<ul class=\"toc_list\">\n<li><a href=\"#Four_1\">4.1 General Requirements<\/a><\/li>\n<li><a href=\"#Four_2\">4.2 Moderate- and High-Impact Systems<\/a><\/li>\n<li><a href=\"#Four_3\">4.3 High-Impact Systems<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#Five_0\">5.0 Training<\/a><\/li>\n<\/ul>\n<\/div>\n<h3 id=\"One_0\">1.0 Overview and Purpose<\/h3>\n<h4 id=\"One_1\">1.1 Information Assurance Policies Generally<\/h4>\n<p>The purposes of the information assurance policies in UPPM Chapter 87: Information Technology and Security are to:<\/p>\n<ul>\n<li>Set requirements to ensure the privacy, confidentiality, integrity, and availability of Washington State University (WSU) data;<\/li>\n<li>Support institutional goals and strategies with appropriate methods for administratively, technically, and operationally protecting data; and<\/li>\n<li>Define the criteria WSU follows to meet requirements for protecting data, which are determined by Information Owners.<\/li>\n<\/ul>\n<p>The policies in this chapter comply with Federal Information Processing Standards (<a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/fips\/nist.fips.199.pdf\">FIPS 199<\/a>), which are intended to help organizations achieve a common level of quality and interoperability in information technology (IT) by requiring categorization of systems as low-impact, moderate-impact, or high-impact for the stated security objectives of confidentiality, integrity, and availability. To determine the potential consequence of a loss event, the Federal Information Processing Standards:<\/p>\n<ul>\n<li>Define WSU Information Owners\u2019 impact categorization rating (Low, Moderate, or High);<\/li>\n<li>Dictate which security controls are mandatory based upon the categorization level;<\/li>\n<li>Define the strength, frequency, and formalization of those controls; and<\/li>\n<li>Influence audit burden and continuous monitoring rigor.<\/li>\n<\/ul>\n<p>See <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-01\/\">UPPM 87.01<\/a> for definitions, general information, and violations related to this policy, as well as additional information regarding roles and responsibilities.<\/p>\n<h4 id=\"One_2\">1.2 Specific Policy Overview and Purpose<\/h4>\n<p>Robust access control and authorization serve as critical safeguards for WSU\u2019s information systems by ensuring that only authorized individuals can access specific data, applications, devices, and systems. This policy reduces the risk of unauthorized access to information systems and institutional data by establishing criteria related to access control and authorization, including specific requirements for moderate- and high-impact systems.<\/p>\n<h3 id=\"Two_0\">2.0 Applicability<\/h3>\n<p>This policy applies to all WSU system users who have contact with, or potentially may have contact with, WSU data, applications, and computing resources.<\/p>\n<p>Security control exceptions to policy statements in UPPM Chapter 87 are managed and maintained in accordance with <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-23\/\">UPPM 87.23<\/a>.<\/p>\n<h3 id=\"Three_0\">3.0 Roles and Responsibilities<\/h3>\n<h4 id=\"Three_1\">3.1 Chief Information Officer<\/h4>\n<p>The Chief Information Officer (CIO) of WSU, or designee, is responsible for administering this policy and reviewing it on an annual basis.<\/p>\n<h4 id=\"Three_2\">3.2 Information System Owners<\/h4>\n<p>WSU Information System Owners, or their delegates, are responsible and accountable for developing appropriate Standard Operating Procedures (SOPs) for this policy&#8217;s implementation.\u00a0<\/p>\n<h4 id=\"Three_3\">3.3 Office of Information Security and Assurance (OISA)<\/h4>\n<p>WSU\u2019s Office of Information Security and Assurance (OISA) shall maintain the <a href=\"https:\/\/its.wsu.edu\/documents\/2026\/01\/access-control-and-authentication-standard.pdf\/\">standard (PDF)<\/a> associated with this policy and provide guidance for the associated procedures for the implementation of this policy (<a href=\"https:\/\/its.wsu.edu\/documents\/2026\/01\/10341.pdf\/\">see examples (PDF)<\/a>).<\/p>\n<p><strong>Note:<\/strong> While all units are required to adhere to the standard established by OISA (<a href=\"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/53\/r5\/upd1\/final\">NIST SP 800-53<\/a>), procedural examples for implementation are optional.<\/p>\n<h3 id=\"Four_0\">4.0 Requirements<\/h3>\n<h4 id=\"Four_1\">4.1 General Requirements<\/h4>\n<p>Information System Owners, or their delegates, must:<\/p>\n<ul>\n<li>Define and maintain a list of WSU employees who are authorized to access each information system within their purview; and<\/li>\n<li>Define and document the types of accounts allowed for use within the system.<\/li>\n<\/ul>\n<p>Access to institutional information systems and services must be based on:<\/p>\n<ul>\n<li>A valid access authorization request;<\/li>\n<li>The intended system usage; and<\/li>\n<li>Other attributes as required by the Information System Owner, based on the institutional or business unit mission and business need.<\/li>\n<\/ul>\n<p>Information System Owners and\/or data custodians must specify the following, as appropriate for each information system within their responsibility:<\/p>\n<ul>\n<li>Authorized users;<\/li>\n<li>Group\/role membership; and<\/li>\n<li>Access authorizations.<\/li>\n<\/ul>\n<p>User accounts\u00a0are to\u00a0be\u00a0provided with\u00a0access to data based on defined roles\u00a0in accordance with\u00a0<a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-03\/\">UPPM 87.03<\/a>.\u00a0<\/p>\n<p>Information Owners, or their delegates, are to provide written or systemically logged and approved authorization for user accounts to access data in accordance with <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-53\/\">UPPM 87.53<\/a>.<\/p>\n<p>Account managers\u00a0are to\u00a0be notified when accounts are no longer\u00a0required, when users are\u00a0terminated\u00a0or transferred, and when system usage or need-to-know changes for an individual.\u00a0<\/p>\n<p>A process is required for changing shared or group account authenticators (if deployed) when individuals are removed from the group.<\/p>\n<p>Authorizations for logical access to information and system resources must be enforced in accordance with access control policies.<\/p>\n<p>WSU must enforce a limit on consecutive invalid logon attempts and implement response actions when the maximum number of unsuccessful logon attempts is exceeded.<\/p>\n<p>When technically feasible, WSU information systems must display a message or banner to employees before granting system access that provides applicable privacy and security notices that the employee must acknowledge before being granted access to the information system.<\/p>\n<p>Information System Owners, or their delegates, must identify user actions that can be performed on information systems without identification or authentication and provide supporting rationale in the system security plan.<\/p>\n<p>Access for remote users must be approved by the Information System Owner, or their delegate, before such connections are allowed. All requests must be documented in accordance with <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-51\/\">UPPM 87.51<\/a>.<\/p>\n<p>The Information System Owner, or their delegate, must approve the wireless devices that are authorized to use WSU System wireless networks in accordance with <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-35\/\">UPPM 87.35<\/a>.<\/p>\n<p>Configuration requirements, connection requirements, and implementation guidance for each type of wireless access must be established. Each type of wireless access is to be authorized prior to allowing a connection to the system.<\/p>\n<p>Information System Owners, or their delegates, must establish connections requirements and authorize the connection of WSU-controlled mobile devices.<\/p>\n<p>Information System Owners, or their delegates, must establish terms and conditions for the use of external systems connecting to WSU information systems prior to allowing external systems to process, store, or transmit WSU data.<\/p>\n<p>Information System Owners, or their delegates, must restrict the use of WSU- controlled portable storage devices used by authorized individuals on external systems.<\/p>\n<p>Information System Owners, or their delegates, must ensure that nonpublic information is not included with publicly accessible information.<\/p>\n<p>WSU system users are to be uniquely identified and authenticated. Replay-resistant multi-factor authentication mechanisms are to be implemented to access privileged and non-privileged accounts.<\/p>\n<h4 id=\"Four_2\">4.2 Moderate- and High-Impact Systems<\/h4>\n<p>In addition to the above, the following requirements apply to all moderate- and high-impact systems.<\/p>\n<p>Moderate- and high-impact systems must use automated mechanisms to support the management of system accounts.<\/p>\n<p>Temporary and emergency accounts with access to moderate- and high-impact systems must be automatically removed or disabled after a defined period.<\/p>\n<p>Accounts with access to moderate- and high-impact systems must be disabled when the accounts:<\/p>\n<ul>\n<li>Have expired;<\/li>\n<li>Are no longer associated with a user or individual;<\/li>\n<li>Are in violation of policy; or<\/li>\n<li>Have been inactive for a defined period.<\/li>\n<\/ul>\n<p>Account creation, modification, enabling, disabling, and removal actions on moderate- and high-impact systems must be automatically audited in accordance with <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-50\/\">UPPM 87.50<\/a>.<\/p>\n<p>Moderate- and high-impact systems are to be configured to automatically terminate user sessions according to defined conditions or events.<\/p>\n<p>Users that access moderate- and high-impact systems must log out after a defined period of inactivity.<\/p>\n<p>High-risk individuals who have access to moderate- and high-impact systems are to have their accounts disabled upon discovery of significant risk.<\/p>\n<p>Moderate- and high-impact systems must employ the principle of least privilege.<\/p>\n<p>Information System Owners, or their delegates, are to enforce approved authorizations for controlling the flow of information within moderate- and high-impact systems and between connected systems.<\/p>\n<p>For moderate- and high-impact systems, Information System Owners, or\u00a0their\u00a0delegates, shall\u00a0identify\u00a0and document critical business functions that require separation of duties.\u00a0<\/p>\n<p>Access to perform security-based functions on moderate- and high-impact systems must be restricted to authorized personnel.\u00a0 Personnel must use non-privileged accounts or roles when accessing non-security-based functions.<\/p>\n<p>For moderate- and high-impact systems, access to privileged accounts must be restricted to specific personnel or roles. Non-privileged users are to be prevented from executing privileged functions. Assigned privileges to roles or users must be reviewed regularly to determine if the rationale for assigning such privileges remains valid.<\/p>\n<p>The execution of privileged functions on moderate- and high-impact systems must be logged in accordance with <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-50\/\">UPPM 87.50<\/a>.<\/p>\n<p>Moderate- and high-impact systems must require a device lock before leaving the system unattended to prevent further access until the user reauthenticates. The device lock must conceal the information previously visible on the display.<\/p>\n<p>Moderate- and high-impact systems must:<\/p>\n<ul>\n<li>Employ automated mechanisms to monitor and control remote access;<\/li>\n<li>Implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions;<\/li>\n<li>Route remote accesses through authorized and managed network access control points; and<\/li>\n<li>Restrict remote access execution of privileged commands and access to security-relevant information. Assessable evidence of command execution and access is to be maintained. The rationale for access is to be documented in the security plan for the system.<\/li>\n<\/ul>\n<p>Moderate- and high-impact systems must protect wireless access to the system using authentication and encryption.<\/p>\n<p>On moderate- and high-impact systems, wireless networking capabilities embedded within the system are to be disabled when not intended for use and prior to component deployment.<\/p>\n<p>The use of external moderate- and high-impact systems is to be limited to authorized individuals after the implementation of external system controls has been verified.<\/p>\n<p>For moderate- and high-impact systems, Information System Owners, or their delegates, must employ automated mechanisms to help employees ensure that information-sharing partners\u2019 access to WSU information does not exceed the access and use restrictions of the WSU information being shared.<\/p>\n<p>Devices accessing moderate- and high-impact systems are to be uniquely Identified and authenticated prior to establishing a connection.<\/p>\n<h4 id=\"Four_3\">4.3 High-Impact Systems<\/h4>\n<p>In addition to the above, the following requirements apply to high-impact systems.<\/p>\n<p>High-impact systems must enforce the principle of least privilege for usage and enable monitoring of atypical account usage.<\/p>\n<p>High-impact systems must prevent encrypted information from bypassing information flow control mechanisms.<\/p>\n<p>Network access to privileged commands on high-impact systems must be based on operational needs and include a documented rationale for access.<\/p>\n<p>For high-impact systems, Information System Owners, or their delegates, must limit the number of concurrent sessions for system accounts.<\/p>\n<p>Users permitted to configure wireless networking capabilities on high-impact systems are to be identified and explicitly authorized.<\/p>\n<p>When shared accounts or authenticators are employed, high-impact systems must require users to be individually authenticated before granting access to the shared accounts or resources.<\/p>\n<h3 id=\"Five_0\">5.0 Training<\/h3>\n<p>See <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-21\/\">UPPM 87.21<\/a> for training requirements related to UPPM Chapter 87.<\/p>\n<p>In addition to the requirements in <a href=\"https:\/\/policies.wsu.edu\/prf\/index\/manuals\/business-policies-and-procedures-manual\/bppm-87-21\/\">UPPM 87.21<\/a>, Information System Owners are responsible for ensuring that users receive appropriate information security and privacy training commensurate with their roles, responsibilities, and authorized access to information systems under the Information System Owner\u2019s authority.<\/p>\n<hr \/>\n<p style=\"font-size: .8rem\">_______________________<br \/><strong>Revisions:<\/strong>\u00a0 Feb. 2026 (Rev. <a href=\"https:\/\/policies.wsu.edu\/prf\/bppm-manual-revisions\/bppm-revision-651\/\">651<\/a>); Nov. 2024 (editorial); June 2020 &#8211; new policy (Rev. <a href=\"https:\/\/policies.wsu.edu\/prf\/bppm-manual-revisions\/bppm-revision-549\/\">549<\/a>)<\/p>\n\n<\/div>\r\n\n<\/div>","protected":false},"excerpt":{"rendered":"<p>University Policies and Procedures Manual&nbsp;(previously Business Policies and Procedures Manual) Access Control and Authorization<\/p>\n","protected":false},"author":1061,"featured_media":0,"parent":50633,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"wsuwp_university_location":[],"wsuwp_university_org":[],"_links":{"self":[{"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages\/43515"}],"collection":[{"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/users\/1061"}],"replies":[{"embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/comments?post=43515"}],"version-history":[{"count":34,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages\/43515\/revisions"}],"predecessor-version":[{"id":69984,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages\/43515\/revisions\/69984"}],"up":[{"embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/pages\/50633"}],"wp:attachment":[{"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/media?parent=43515"}],"wp:term":[{"taxonomy":"wsuwp_university_location","embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/wsuwp_university_location?post=43515"},{"taxonomy":"wsuwp_university_org","embeddable":true,"href":"https:\/\/policies.wsu.edu\/prf\/wp-json\/wp\/v2\/wsuwp_university_org?post=43515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}