Access Control
Policy 14.5 | |
---|---|
Approved by: | President |
Responsible Officer: | CHIEF INFORMATION OFFICER |
Responsible Office: | INFORMATION TECHNOLOGY SERVICES |
Originally Issued: | 06/30/2025 |
Last Revision: | NEW |
Category: | TECHNOLOGY |
Related Policy | |
SD BOR 7.1 Acceptable Use of Information Technology Systems |
|
SD BOR 7.4 Security of Information Technology Systems |
|
DSU User Account Creation & Retention | |
DSU Password Policy |
-
Reason for Policy
This policy ensures secure and controlled access to DSU's information and technology resources. It establishes roles, responsibilities, and procedures for granting, reviewing, and revoking access, applying to all individuals with logical access to the university's systems, including staff, faculty, students, contractors, and affiliates. It covers digital and physical systems managed by the University, such as devices, data storage, and network equipment.
-
Definitions
- CIO (Chief Information Officer). Campus Chief Information Officer is the department head for the DSU (Dakota State University) technology department.
- Data Steward. The Data Steward is authorized to grant, modify, and revoke access privileges for PII within their purview as assigned by the Data Trustee.
- Information Resources. Information resources cover all assets utilized to store, process, and transmit information within an organization. This includes hardware such as servers and computers, software applications, databases, and the networks that connect them.
- Least Privilege. Providing each user, task, and process with only the minimal privileges and access necessary to perform the users assigned role or function, including access to information systems and facilities.
- Service Account. A non-human account used by applications, services, or automated processes to authenticate and interact with systems securely, typically with restricted permissions and no interactive login.
- Data Trustee. The Data Trustee is authorized to grant, modify, and revoke access privileges for PII within their purview as assigned by the Data Trustee.
- Users. Employees, students, Emeriti, and third-Party vendor or affiliates, volunteers, agents, and authorized users accessing University information technology systems and applications.
-
Statement of Policy
- Principle of Least Privilege: DSU shall control user access to information systems by enforcing the principle of least privilege.
- Access Control:
- Access to information resources must be limited to authorized users and safeguarded through appropriate physical, administrative, and logical authentication and authorization controls.
- All users of DSU information systems must be accurately identified, a positive identification must be maintained throughout the login session, and actions must be linked to specific users.
- Generic or group IDs shall not be permitted as means of access to the university’s information resources.
- All requests for access must include proper justification and will not be granted without the approval of the appropriate data trustee.
- Access Request: Data trustees and data stewards are responsible for determining the access control of information systems within their unit/department and information domain. They are required to specify authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account.
- The Dean, department head, direct supervisor shall request access privileges of the user based on the user's role.
- Access requests shall specify the user’s role.
- Authentication: Authentication is the means of ensuring the validity of the user identification and all user access must be authenticated.
- User identity must be validated with a username and password. Please refer to Password Policy.
- Exceptions for password-less sign-ins are permitted only if a compensation control verifies the user’s identity with a combination of factors: something the user is, something the user knows, and something the user has.
- Multi-factor authentication (MFA) shall be implemented and required for accessing sensitive systems, applications, and data repositories, as determined by the CIO.
- User identity must be validated with a username and password. Please refer to Password Policy.
- Privilege Management:
- The University shall implement a Role-based Access Control (RBAC) model to set minimum standards for access privileges, ensuring efficient management of user permissions. This model assigns access based on user roles, which are defined by job functions, and permissions that align with role responsibilities.
- Account Management:
- Data trustees and supervisors shall regularly audit access privileges to validate they are appropriate and necessary, including a review to ensure that all user access is still required and suitable.
- Remote Access: Remote access to the University ’s information systems is governed by the BOR Remote Work Policy.
- Service Accounts: Service accounts created specifically for services and applications shall be restricted solely for system services use. The use of standard user accounts to operate system services is strictly forbidden. Systems and devices shall be configured to block remote logins via service accounts.
- Compliance: Non-compliance with this policy may result in disciplinary actions, in accordance with established protocols for students, faculty, and staff as outlined in relevant policies such as the student regulations, faculty handbook, or staff handbook. Consequences may include suspension of access privileges, and/ or legal proceedings, depending on the severity of the violation.
Exclusions
N/A
Exceptions
Exception requests must be submitted through an ITS ticket request and must include appropriate justification and any supporting documentation.
-
Procedures (Major)
- Access Identification. ITS shall complete the following procedures prior to employee access:
- Determine the specific systems, applications, or resources the employee would need access to.
- Ensure access requested aligns with the employee’s job responsibilities and duties.
- Complete the Access Request Form.
- Approval and Confirmation.
- Upon approval, ITS will set up the necessary access or facilitate additional requests for systems not managed by DSU (i.e., Banner, D2l, etc.).
- The requestor will receive during this process a confirmation email once the access is granted or denied.
- Inform employees that their access has been set up and provide any necessary instructions for the first time login or use.
- Access Review
- Data trustees and supervisors shall periodically review the access privileges of their employees to ensure appropriateness.
- The supervisor shall submit an Access Request Form to revoke or modify as required.
- ITS shall periodically review the access of all end-users and verify justification for continued access.
- Data trustees and supervisors shall periodically review the access privileges of their employees to ensure appropriateness.
- Access Identification. ITS shall complete the following procedures prior to employee access:
-
Related Documents, Forms, and Tools
-
Policy History
Adopted: 06/30/2025