Privileged Access Policy
This policy covers all Loyola employees who have administrative access to any Loyola servers.
To ensure that users are either logging on to Loyola servers with their username and password before escalating their privileges, or that they have a non-shared account that has escalated privileges. This will create an auditable trail of all activity on a system regardless of whether the system supports privilege escalation after logon.
System Access – Unix and Linux servers
All users who want to access a Unix or Linux system as a root user or superuser must first logon to the system with an ID that uniquely identifies them, and for which only they know the password. After logging on, the user can use the appropriate system command to elevate their account privileges. By first logging on with their user ID, the user creates an audit trail for any changes committed by the privileged account. If a user has access to a root user or superuser password for a given system but does not have an individual user account on the system, an account must be created for them.
System Access –NetWare servers
NetWare does not provide the ability to move a user’s privileges to an administrator or superuser after an initial logon as a normal user. Users who require superuser access to NetWare servers should have additional rights tied to their UVID.
System Access –Windows servers
Users who are part of the Server Operations team will access Windows servers through the approved administrative accounts. Passwords associated with administrative accounts must meet Loyola’s password standards for privileged accounts and must be changed at regular intervals or anytime a team member leaves the team. Users who are not part of the Server Operations team who require frequent administrator access to a Windows system must have an account on the system with administrator privileges which only they know the password. Users who are not part of the Server Operations team who require infrequent access to a Windows server must work with the Server Operations team to obtain a temporary account with administrator privileges. This account will be disabled once the user has performed the task that they need to accomplish.
Failure to follow this policy can result in disciplinary action as provided in the Staff Handbook, Student Worker Employment Guide, and Faculty Handbook. Disciplinary action for not following this policy may include termination, as provided in the applicable handbook or employment guide.
If a user is unable to follow the above policies and must remotely access a Loyola server as a root user, superuser, or administrator, they must send an email to their supervisor indicating the reason why they must do this, the time of their login, the time of their logout, and their IP address.
April 20, 2007: Initial Policy
June 7, 2012: Annual Review for PCI Compliance
October 29, 2012 References to non-existent departments changed
June 7, 2013: Changed wording for Windows Server section, corrected formatting.
June 4, 2014: Annual review for PCI Compliance