BACKGROUND
This document was developed because of the security issues created due to providing access beyond the requirement and low penetration testing maintenance. All the policy guidelines must be made available to all the individuals who are responsible for handling confidential data.
3. SCOPE
These policies apply to the use of the data correctly and protect the confidential data. This policy applies to all the data usage access and also the data which is accessed using the passwords. These policies apply to all the members in the organization and all other persons who are involved through the organization.
4. OPERATIONAL POLICY
4.1. Section 1
Procedure for creating strong passwords should be done. System should be developed in such a way that an account can’t be opened in multiple units using the same user id and password so that even if the password is known for other user, they can’t open in their units. Procedure should be such that multiple accepts should be declined. Procedure should include fingerprint scan access instead of traditional type in access both at the door entrance access and for the computer login