Effective Date: 01 Sep 2025
The Access Control Policy defines the controls that must be implemented and maintained in order to protect information assets against unauthorized access that might pose substantial risk to the organization. The policy intends to establish adequate controls for user-access management, network access, operating system, and database and application access within Manodayam. (Here it is referred to as “Manodayam”). This policy shall also be applicable to third-party Service Providers which have such accesses or can provide such access rights to other users.
This policy establishes the Access Control Policy, for managing risks from user account management, access enforcement and monitoring, separation of duties, and remote access through the establishment of an Access Control program. The access control program helps Manodayam implement security best practices with regard to logical security, account management, and remote access.
It is the responsibility of the Functional SPOCs/HODs (Department wise) to implement and enforce the controls defined within the Access Control Policy. It is the responsibility of the Chief Information Security Officer (CTO) to monitor critical Access Rights of important business applications.
Information System – A combination of hardware, software, infrastructure, and trained personnel organized to facilitate planning, control, coordination, and decision-making in an organization.
Information systems in this policy shall refer to Business applications, Support applications, Operating Systems, Databases and Network Infrastructure.
Access to the information systems shall be controlled, based on business and security requirements and should be commensurate with the asset classification. Access controls shall be deployed based on the principle of “need-to-have” in order to protect the information from unauthorized access.
The allocation of access rights to information systems and services shall be done in accordance with the requirement given by the supervisor and approved by the HOD. The policy encompasses all stages in the lifecycle of user access.
• Initial registration of users.
• Transfer of users to other departments/projects/ profiles; and
• De-registration of users.
“User” registration for employees shall be done according to authorization by HR (for email access & user ID creation) and by respective HOD (for applications). The following shall be ensured:
“User” de-registration for employees shall be done according to authorization by HR (for email access & user Id) or by respective HOD (for business applications). Following shall be ensured:
Assignment of privileged access to user accounts / IDs on the Information systems shall be controlled through a formal authorization process. The privilege rights for IT infrastructure management shall be based on a need-to-know basis and approved from CTO. The access shall be revoked post-completion of activities. CTO shall review list of privileged user access every six months. The following shall be considered:
Secret authentication information such as passwords, cryptographic keys, smart cards etc. is a common means of verifying user identity. The process should include the following:
The review of user access rights shall take into consideration the following:-
All access rights to employees and Third-Party Service Provider staff shall be removed upon termination of their employment, contract, or adjusted upon change or in any other event of their separation from Manodayam.
All employees and Third-Party Service Provider staff with access to information systems are required to understand their responsibilities for maintaining effective access controls, particularly regarding the use of passwords and the security of user equipment. They shall follow Manodayam’s policies in the use of secret authentication information.
Automatic account lockout for 15 minutes will be implemented to lock the screen of the information systems when left unattended. It is the responsibility of all employees and Third Party to lock their screens when they leave it unattended.
Manodayam Employees are required to:-
All employees with access to information assets shall be made aware of the information security requirements and procedures for protecting unattended equipment. The users are required to do the following:-
Appropriate controls for user access to networks and network services shall be applied. The controls shall ensure that:-
Adequate security controls shall be implemented to authenticate the user for remote access. IT department shall manage remote access connections and ensure that:-
Internet site and file filtering must be enabled to block access to Internet sites and files deemed inappropriate or potentially dangerous for business use.
Internal access to the Internet is to be routed through Internet access servers (proxy servers) or network firewalls with filtering technology enabled.
Access between domains can be allowed but should be controlled at the perimeter using a gateway e.g. a firewall or filtering router
Any changes to the Firewall rules, or other network device configuration should be logged. It should follow a change management process.
Adequate security controls shall be implemented on the information systems to restrict operating systems access to authorized users only. The controls shall authenticate the authorized users and record the successful and failed system authentication attempts.
The operating systems of servers, workstations and/ or network devices shall be controlled through a secure log-on procedure to minimize the risk of unauthorized access. The log-on procedure shall not disclose any system information. Log-on procedure shall: Ensure that previous logged-on user information shall not be displayed in the login console/window.
Validate the log-on information on completion of all input data. If an error condition arises, the system should not display an error message which leaks the internal configurations of the information systems.
Limit the number of unsuccessful log-on attempts to 3 and Ensure automatic terminal lockout after a specified duration of 15 min. An exception to this would be terminals which are under continuous monitoring.
Not display system or application identifiers until the log-on process has been successfully completed.
Display a general notice warning that the computer should only be accessed by authorised users.
Not provide help messages during the log-on procedure that would aid an unauthorized user.
Validate the log-on information only on completion of all input data. If an error condition arises, the system should not indicate which part of the data is correct or incorrect.
Protect against brute force log-on attempts.
Log unsuccessful and successful attempts.
Raise a security event if a potential attempted or successful breach of log-on controls is detected.
Display the following information on completion of a successful log-on:
Not display a password being entered; not transmit passwords in clear text over a network.
Terminate inactive sessions after a defined period of inactivity, especially in high-risk locations such as public or external areas outside the organization’s security management or on mobile devices.
Restrict connection times to provide additional security for high-risk applications and reduce the window of opportunity for unauthorized access.
Refer to section “User Access Management” of this policy for User Identity management.
Appropriate authentication mechanisms shall be implemented for all systems based on identified security needs.
Use of utility programs that could override the system and application controls shall be restricted and tightly controlled and only authorized utilities shall be used for remote management (of the servers, workstations, and network devices). Activities carried out by using such utilities are logged. The following shall be considered:
Information systems and applications that are accessed from external networks and the Internet shall be equipped with session time-out controls to clear the session screen and terminate the application sessions after a specified duration of inactivity.
Access to information and application systems shall be restricted to authorized users only as per the policy. The appropriate security controls shall be used to restrict access to information systems.
Access to systems and applications shall be controlled by secure log-on procedures.
Password management procedure shall be implemented to ensure quality passwords.
Use of utility programs capable of overriding system and applications controls shall be restricted and tightly controlled.
Access to program code shall be restricted through following means.
Access to source code should be restricted to authorized users only.
Updating of source code should be performed after receipt of proper approvals.
An audit log of all activities for source codes should be maintained.
Copying of program codes should be subject to change control procedure.
Developer shall not have access to production environment and segregation of duties shall be implemented as appropriate.