User Authentication and Authorization Policy
Subscriber Content
User authentication and authorization are important aspects of network security and are the main gate of protection against unauthorized entry and access to a company’s computer network.
This policy establishes user authentication and authorization and other access rules that help protect a company’s computer systems and facilitate enforcement of Information Security Services (ISS) policies, procedures, standards, and guidelines. A company’s software developers are responsible for taking the appropriate steps, as outlined in this policy, to employ those development practices that will create and sustain a robust defense against internal or external network intrusions.