Account Management Guidelines
Securing User Access
NOTICE |
---|
POTENTIAL COMPROMISE OF SYSTEM AVAILABILITY, INTEGRITY,
AND CONFIDENTIALITY
Use cybersecurity best practices when configuring user
access.
Failure to follow these instructions can result in
unintended data loss or loss of application function.
|
Cybersecurity policies that govern user accounts and access, such as least privilege and separation of duties, vary from site to site. Work with the facility IT system administrator to ensure that user access adheres to the site-specific cybersecurity policies.
Recommendations to optimize cybersecurity in a protected environment:
-
Make sure not to use a shared user account. Use a separate account for each user.
-
Assign users only the essential permissions needed to perform their role.
-
Revoke user permissions when no longer needed due to role change, transfer, or termination.