Policy Corporate Governance Information Security – Access and Account Management Procedure

Information Security – Access and Account Management Procedure


Print Friendly and PDFPrint Friendly

Intent

This Procedure has been developed to support the Information Security Policy, and provides guidance for managing user accounts and access to the digital assets of James Cook University (JCU; the University). It ensures operational security, integrity, and compliance of the University’s information systems, user accounts, and data with relevant industry standards.

Scope

This Procedure applies to all Authorised Users of JCU’s information management system regardless of location, whether during or after business hours, or whether on JCU-owned or privately owned devices.

Definitions

Refer to the Digital Policy Glossary for a comprehensive list of definitions, terms and explanations relating to information security at JCU.

Access Rights: Permissions assigned to authorised users to access assets, systems, and applications required for academic, administrative, or operational activities, adhering to the principles of Role-Based Access and the Least Privilege Principle.

Account Type(s): Categories of user accounts managed under the University’s Information Security – Identity and Access Management Standard.

Authentication: The process of verifying a user’s identity through credentials such as passwords, biometrics, security codes, or tokens.

Authorisation: The process of validating a user’s permissions to access resources or systems, ensuring they can only access authorised areas.

Identification: The act of establishing a user’s identity, typically through credentials such as a username or email address.

Least Privilege Principle: Ensures users are granted the minimum level of access required to perform their responsibilities, reducing security risks by limiting access to sensitive resources.

Review of Access Rights: A periodic evaluation of user access to ensure it aligns with their current roles and responsibilities. Access may be revoked immediately for policy violations or upon termination of the user’s association with the university.

Role-Based Access Control (RBAC): A method of granting access to digital resources based on a user’s role and responsibilities, ensuring permissions are appropriate for their duties.

Security Operations Centre (SOC): Is responsible for monitoring, assessing, and defending an organisation against cybersecurity threats. The SOC handles real-time incident response, threat analysis, and maintains continuous surveillance of the organisation’s security posture.

Single Sign On (SSO): A session and user authentication service that allows a user to use one set of login credentials to access multiple applications.

System Administrator: An individual responsible for managing user accounts and access rights within systems at James Cook University (JCU).

Introduction

JCU leverages automated account provisioning for most account types (e.g., staff and student accounts) through authoritative systems like the Human Resources System and Student Management System. These automated processes streamline identity creation, modification, and termination of most user accounts.

Where account types and systems are unable to support automation manual account provisioning and access management are required. This procedure primarily focuses on the workflows and responsibilities for managing accounts manually, ensuring compliance with organisational policies and security standards.

The following internal standards provide detailed guidance and requirements to support this procedure:

  • Information Security – Identity and Access Management (IAM) Standard; and
  • Information Security – Authentication Management Standard.

Internal standards are managed and maintained by the Technology Solutions Directorate ensuring they remain current and aligned with evolving requirements.

Procedure

1. User Access Roles and Responsibilities

Action

Responsible Officer

Define the roles and responsibilities for users based on Role-Based Access Control (RBAC) and Least Privilege Principle.

  • Direct Manager

Manage the application configuration to enforce defined roles and responsibilities, ensuring permissions align with RBAC and the Least Privilege Principle.

  • Product Owner
  • System Administrator

2. Adding Digital Technology Assets to JCU’s Identity Management System

Action

Responsible Officer

Submit a ServiceNow request to ensure all new and existing digital technology assets are added to JCU’s identity management system.

If integration with existing systems is not possible, apply for an exemption in accordance with the Exemption Process below.

  • Product Owner
  • System Administrator

Provision, maintain and configure systems in the Identity Management System as outlined in the Account Creation and Management process below.

  • System Administrator – Identity Management System*

* The “System Administrator – Identity Management System” has specific responsibilities in this section. This role holds all other responsibilities named under “System Administrator" as defined throughout the procedure.

3. Account Creation and Management

3.1 Automated Account Creation

Action

Responsible Officer

Assign roles and permissions based on pre-configured rules that align with specific job functions or academic roles.

  • Product Owner
  • System Administrator

Synchronise identity data from authoritative systems to ensure accuracy and prevent duplication.

  • Product Owner
  • System Administrator

3.2 Manual Account Creation

Action

Responsible Officer

Submit requests for new accounts through the Access Request workflows in ServiceNow.

If a workflow is not available for a particular system, submit a ‘Request Help’ form in ServiceNow specifying:

  • System name
  • Type of access required
  • Justification
  • Manager approval (Email attachment).
  • Requestor (typically Direct Manager)

Ensure identification of the user through a unique identifier (e.g., username or email address) before creating the account.

  • Product Owner
  • System Administrator

Create the account and assign access rights based on RBAC and the Least Privilege Principle.

  • Product Owner
  • System Administrator

4. Authentication Management

Action

Responsible Officer

Ensure that all authentication requirements (single sign on, multi factor authentication and passwords) for accounts are implemented in accordance with the Information Security - Authentication Management Standard.

If not possible, seek an exemption in accordance with the Exemption Process below.

  • Product Owner
  • System Administrator

5. Account Modifications and Access Removal

Action

Responsible Officer

Ensure user access rights reflect any changes to role requirements or responsibilities.

  • Direct Manager

Update access rights as soon as advised - removals and standard modifications must be actioned immediately, while modifications to increase access should be completed by close of business or as a priority the next business day if received after hours

  • Product Owner
  • System Administrator

Lock accounts for terminated employees as per timelines defined in the Information Security - Identity and Access Management (IAM) Standard.

  • Product Owner
  • System Administrator

6. Logging and Monitoring

Action

Responsible Officer

Ensure all log types, including but not limited to authentication, access, and account-related events as required by this procedure and any related internal standards, are sent to the Security Operations Centre (SOC) for continuous monitoring, alerting, and analysis. Examples include:

  • Authentication activities such as successful and failed access attempts;
  • Privileged access activities such as grants and denials;
  • Account activity logs such as inactive and terminated accounts;
  • System and application logs related to access or authentication; and
  • Network access logs relevant to account and system access.

Sufficient detail must be included in logs to support root cause analysis and auditing purposes, including but not limited to:

  • Timestamp;
  • User identity;
  • System accessed;
  • Action performed; and
  • Success or failure status.

If sending logs to the SOC is not possible, alternative automated tools must be used to detect unauthorised activities or anomalies in real-time.

  • Product Owner
  • System Administrator

Retain logs according to JCU’s data retention policies.

  • Product Owner
  • System Administrator

Review logs quarterly to detect anomalies or unauthorised activities and report these to the Cybersecurity Team for investigation.

  • Security Operations Centre (SOC)

Investigate incidents including:

  • Conducting root cause analysis and identifying corrective actions;
  • Escalating critical incidents to senior management and relevant stakeholders as required;
  • Tracking and maintaining a record of all reported incidents in ServiceNow.
  • Information and Cybersecurity Manager

7. Reporting Incidents and Unauthorised Access

Action

Responsible Officer

Immediately report incidents of unauthorised access or suspicious activity related to this procedure and any associated internal standards to the Cybersecurity Team and log an incident in ServiceNow.

  • Product Owner
  • System Administrator

Implement incident response procedures as outlined in the Cyber Security Incident Response Plan.

  • Cybersecurity Team

8. Emergency Access Provisioning

Action

Responsible Officer

Provision temporary emergency access upon approval for critical incidents managed in ServiceNow.

  • Product Owner
  • System Administrator

Assign minimal access necessary to address the emergency.

  • Product Owner
  • System Administrator

Log and monitor all emergency access activity during the incident.

  • Product Owner
  • System Administrator

Revoke emergency access immediately upon resolution of the incident.

  • Product Owner
  • System Administrator

9. Access and Account Reviews

Action

Responsible Officer

Send reminders to Product Owners and System Administrators to conduct annual access and compliance reviews.

  • Governance, Risk & Compliance Manager

Conduct annual reviews to ensure:

  • Compliance with the requirements of internal standards associated with this procedure;
  • Access rights remain appropriate and align with Role-based Access and the Least Privilege Principle;
  • Privileged and generic accounts are validated;
  • Dormant or inactive accounts are removed.
  • Product Owner
  • System Administrator

If any risks, anomalies, or concerns are identified, submit a ServiceNow request to the Cybersecurity Team for further investigation.

  • Product Owner
  • System Administrator

Ensure findings and user feedback informs updates and improvements to policies, processes and other documentation.

  • Product Owner
  • System Administrator

10. Exemption Process

Action

Responsible Officer

Submit a general ServiceNow request to the Cybersecurity Team, detailing:

  • The name of the request as an “Exemption/Exception”.
  • The access or authentication deviation required.
  • Justification for the exemption (e.g., operational needs, technical limitations).
  • Any mitigating controls that will be implemented.
  • Product Owner
  • System Administrator

Approve or deny the exemption/exception documenting the decision in ServiceNow.

  • Information and Cybersecurity Manager

Record the exemption/exception in the Information Security Risk Register.

  • Governance, Risk & Compliance Manager

Monitor and review the exemption/exception periodically to ensure continued relevance and appropriateness.

  • Governance, Risk & Compliance Manager

11. Awareness and Training

Action

Responsible Officer

Identify training needs related to this procedure and associated internal standards annually and in consultation with the Cyber Team and Technology Solutions’ Senior Management Team.

Notify the Cyber Training and Awareness Coordinator to schedule the required training.

  • Governance, Risk & Compliance Manager

Related policy instruments

Digital Technologies Acceptable Use Policy

Digital Technologies Acceptable Use Procedure

Queensland Government Information Security Policy (IS 18:2018)

ISO/IEC 27001 Information security, cybersecurity, and privacy protection – Information security management systems – Requirements

ISO/IEC 27002 Information security, cybersecurity, and privacy protection – Information security controls

Information Security Policy

Information Security Management Framework

Information Security – Identity and Access Management Standard (IAM) Standard

Information Security – Authentication Management Standard

Schedules/Appendices

Nil

Administration

NOTE: Printed copies of this procedure are uncontrolled, and currency can only be assured at the time of printing.

Approval Details

Policy DomainCorporate Governance

Policy Sub-domain

Risk, Assurance, Regulatory and Compliance

Policy Custodian Vice Chancellor

Approval Authority

Council

Date for next Major Review

09/05/2030

Revision History

Version

Approval date

Implementation date

Details

Author

25-109/05/202513/05/2025Procedure revised to support the Information Security Policy. Renamed from ICT Account and Access Management Procedure to Information Security – Access and Account Management Procedure.Chief Information Security Officer
22-1 13/07/2022 18/07/2022 Procedure amended to clarify password requirements Manager, Information and Cyber Security

2017-1

08/02/2017 09/02/2017

Procedure established

Information and Communications Technology

Keywords

Keywords

IAM, joiners, movers, leavers, NIST, ISO, authentication, MFA, SSO, passwords

Contact person Information Security - Governance, Risk and Compliance Manager