User Authentication and Authorization Policy
Subscriber Content
Procedures for Secure User Authentication and Authorization Management
User authentication and authorization are important aspects of network security and are the main gate of protection against unauthorized entry and access to a company’s computer network.
This policy establishes user authentication and authorization and other access rules that help protect a company’s computer systems and facilitate enforcement of Information Security Services (ISS) policies, procedures, standards, and guidelines. A company’s software developers are responsible for taking the appropriate steps, as outlined in this policy, to employ those development practices that will create and sustain a robust defense against internal or external network intrusions.