SCIO Identification and Authentication
SCIO Identification and Authentication
SCIO Identification and Authentication
Document No.
Identification and SCIO-SEC-307-00
Authentication Policy
Status Effective Date Version Page No.
Final 01/29/2018 1 1 of 9
Scope
The Statewide Information Security Polices are the foundation for information technology security in
North Carolina. The policies set out the statewide information security standards required by
N.C.G.S. §143B-1376, which directs the State Chief Information Officer (Agency CIO) to establish an
agency wide set of standards for information technology security to maximize the functionality,
security, and interoperability of the State’s distributed information technology assets, including, but
not limited to, data classification and management, communications, and encryption technologies.
These standards apply to all executive branch agencies, their agents or designees subject to Article
15 of N.C.G.S. §143B. Use by local governments, local education agencies (LEAs), community
colleges, constituent institutions of the University of North Carolina (UNC) and other executive
branch agencies is encouraged to the extent allowed by law.
Responsibilities
All covered personnel accessing or using IT resources are responsible for adhering to this policy and
with any local Identification and Authentication requirements.
Role Definition
Agency The Agency Head, the Chief Information Officer (CIO), the Chief Information Security
Management Officer (CISO), or other designated agency officials at the senior leadership level are
assigned the responsibility for the continued development, implementation, operation
and monitoring of the Identification and Authentication process.
Agency Security Agency Security liaisons are responsible for ensuring that adequate user identification
Liaisons and authentication controls are present in all agency computing environments including
those managed by agencies or by third parties.
Information The Information System Owner (SO) is responsible for ensuring that identification and
System Owner authentication controls for the system are implemented in coordination with agencies,
information owners, security system administration, and the information system security
officer, and functional “end users.”
Information The information owner is the individual with operational responsibility and authority for
Owner specified information and responsibility for establishing the controls for its generation,
collection, processing, dissemination, and disposal. Provides input to information system
owners (ISO)s regarding security requirements and security controls for the information
system(s) where the information resides. Decides who has access to the information
system and with what types of privileges or access rights.
Covered Covered personnel are responsible for following the approved identification and
Personnel authentication processes and the supporting controls.
Third Parties Third party service providers with systems interconnected to the agency network are
responsible for managing identification and authentication actions in accordance with
this policy.
DocuSign Envelope ID: E5CB13AF-9709-43DE-A395-44FC852E1C0C
Document No.
Identification and NC-SEC-307-00
Authentication Policy
Status Effective Date Version Page No.
Final 01/29/2018 1 2 of 9
IA-1 - Policy
This policy document provides agency security policy requirements for the management of user
identification and authentication which is required to safeguard access to agency information and
information systems and critical business processes. This document addresses the standards set
forth by the State to implement the family of Identification and Authentication controls.
The State has adopted the Identification and Authentication principles established in NIST SP 800-53
Rev 4 “Risk Assessment” control guidelines as the official policy for this security domain. The “IA”
designator identified in each control represents the NIST-specified identifier for the Identification
and Authentication control family. The following subsections in this document outline the
Identification and Authentication requirements that each agency must develop, or adhere to in
order to be compliant with this policy. This policy shall be reviewed annually, at a minimum.
Document No.
Identification and NC-SEC-307-00
Authentication Policy
Status Effective Date Version Page No.
Final 01/29/2018 1 3 of 9
ii. Remote network access with privileged and non-privileged accounts for information systems
that receive, process, store, or transmit federal tax information (FTI) or other highly
restricted data.
iii. Remote access with privileged and non-privileged accounts such that one of the factors is
provided by a device separate from the system gaining access. The purpose of requiring a
device that is separate from the information system gaining access for one of the factors
during multifactor authentication is to reduce the likelihood of compromising authentication
credentials stored on the system.
e. Agency information systems shall implement replay-resistant authentication mechanisms for
network access to privileged accounts, if possible. Authentication processes resist replay attacks
if it is impractical for an attacker to replay previous authentication messages and thus achieve
unauthorized access. Replay-resistant techniques include, for example, protocols that use
challenges such as Transport Layer Security (TLS) and time synchronous or challenge-response
one-time authenticators (one-time passwords).
Document No.
Identification and NC-SEC-307-00
Authentication Policy
Status Effective Date Version Page No.
Final 01/29/2018 1 4 of 9
Document No.
Identification and NC-SEC-307-00
Authentication Policy
Status Effective Date Version Page No.
Final 01/29/2018 1 5 of 9
use. Refer to the Access Control policy AC-8 - System Use Notification for the standard State
approved banner.
j. The log-on process should not be validated until all log-on data is input. Failing the process as
each input field is completed will provide an attacker with information to further the attack.
k. Only generic “log-on failed” messages should be displayed if the user does not complete the
log-on process successfully. Do not identify in the message whether the user identification,
password, or other information is incorrect.
l. Agencies shall configure systems to limit the number of consecutive unsuccessful log-on
attempts. If the number of consecutive unsuccessful log-on attempts exceeds the established
limit, the configuration shall either force a time delay before further log-on attempts are
allowed or shall disable the user account such that it can only be reactivated by a system or
security administrator or an authorized service desk staff member.
m. For systems that store, transmit, or process FTI, the agency shall password-protect the system
initialization (boot) settings.
n. All newly assigned passwords shall be changed the first time a user logs into the information
system.
o. Where technically feasible, passwords shall be at least eight (8) characters long for access to all
systems and applications.
p. Passwords shall have at least one numeric, at least one special character, and a mixture of at
least one uppercase and at least one lowercase letter.
q. Passwords shall not contain number or character substitutes to create dictionary words (e.g.,
d33psl33p for deep sleep2).
r. Account passwords shall not traverse the network or be stored in clear text. All passwords
stored shall be encrypted using FIPS-140-2 encryption.
s. Passwords shall not be inserted into email messages or other forms of electronic
communication without proper encryption.
t. Information systems may allow the use of a temporary password for system logons as long as
the temporary password is immediately changed to a permanent password upon the next logon
attempt.
u. Passwords shall be different from all other accounts held by that user.
v. Agencies may use password management tools approved by the Enterprise Security and Risk
Management Office (ESRMO). Approved password managers must be installed and managed
locally on the user’s machine (not offsite or in the “cloud”), must securely store passwords with
a master key or key file, and must encrypt the password list with FIPS 140-2 encryption.
w. Passwords shall not be revealed to anyone, including supervisors, help desk personnel, security
administrators, family members or co-workers.
DocuSign Envelope ID: E5CB13AF-9709-43DE-A395-44FC852E1C0C
Document No.
Identification and NC-SEC-307-00
Authentication Policy
Status Effective Date Version Page No.
Final 01/29/2018 1 6 of 9
x. Users shall enter passwords manually for each application or system, except for simplified/single
sign-on systems that have been approved by the State CIO.
y. Passwords shall be changed whenever there is the suspicion or likelihood that the password or
system is compromised.
z. Agencies shall validate the identity of an end user who requests a password reset. Initial
passwords and subsequent password resets shall utilize a unique password for each user
account.
Document No.
Identification and NC-SEC-307-00
Authentication Policy
Status Effective Date Version Page No.
Final 01/29/2018 1 7 of 9
Document No.
Identification and NC-SEC-307-00
Authentication Policy
Status Effective Date Version Page No.
Final 01/29/2018 1 8 of 9
Enforcement
Violations of this policy or failure to implement provisions of this policy may result in
disciplinary action up to and including termination, civil litigation, and/or criminal
prosecution.
Document No.
Identification and NC-SEC-307-00
Authentication Policy
Status Effective Date Version Page No.
Final 01/29/2018 1 9 of 9