”… User accounts must be properly managed, and old and inactive accounts de-provisioned in accordance with policy.”
In multiple audits of identity and access management for USG’s three primary enterprise information technology systems (PeopleSoft, BANNER, and ADP), we found active user accounts associated with employees who had separated from service, and many other old user accounts that were not fully deactivated. All institutions should work to diligently manage access to these systems, and have many options and tools to achieve this goal, including the following recommendations:
This issue is easily remedied for the PeopleSoft system, and several existing business practices designed to assist database and security administrators with provisioning and de-provisioning access currently exist. In our analysis, we produced and examined a comprehensive list of all existing PeopleSoft user accounts, including those that were “locked.” PeopleSoft user data is cumulative, and old user accounts should not be deleted in order to avoid the risk of corrupting the integrity of historical data, according to current ITS practices. However, old user accounts for employees no longer requiring access to the system should be deactivated in accordance with GeorgiaFIRST Business Process Document SC.080.106 – “Managing Terminated User Access,” available online at the GeorgiaFIRST production Web site.
The risks of poor identity and access management are numerous:
As described by this document, all accounts for users no longer requiring access to the PeopleSoft system should first be “locked” from the User Profile screen, preventing the account from active use. However, an often overlooked second step is necessary to fully deactivate the account. Administrators should take the additional precaution of removing the “BOR PeopleSoft User” role from the account permissions on the User Roles page. Removing this role disallows the account from possessing sign-in credentials, thus preventing any future reactivation of the account. In our analysis, we found a substantial number of user accounts with no recorded activity for several years, which is to be expected – however, while most of these accounts were “locked,” many still possessed the “BOR PeopleSoft User” role permission.
Posted by Ted Beck
Published in: Audit Findings