Proxymity

Access Controls

  • Maintain technical, logical, and administrative controls designed to limit access and adhering to the “principle of least privilege”
  • Restrict logical access to client data to authorised users, based on a specific business need and following approval by designated systems owners
  • Maintain access management policies and practices that require prompt termination of access after termination or reassignment of an employee or system end-user
  • Restrict access to system resources to authorised employees with valid multi-factor authentication (MFA) tokens over an encrypted virtual private network (VPN) connection
  • Ensure passwords require minimum character length and complexity, and a limit on the number of attempts to enter a password before the user ID is suspended
  • Maintain technical controls and audit policies to ensure that all system access/ technology changes are logged and traceable against unique user IDs

Stay in touch

Stay updated with the latest trends. Sign up for our newsletter.