<  All Posts

NHS DSPT: Protecting Against Cyber Attacks and Data Breaches - B2 Identity and Access Control

B2.a Identity Verification, Authentication, and Authorisation

Key Point:
Your organisation must robustly verify, authenticate, and authorise staff access to information, systems, and networks essential to your operations.

Overview:
This outcome ensures that your organisation has strong cyber security and information governance (IG) controls for managing user access to critical information. Ensuring that only authorised staff have access helps prevent unauthorised access and data breaches.

How to Meet the Requirement:
Before granting access, conduct thorough pre-employment checks to verify identity, especially for sensitive or privileged access roles. Authentication must be tied to individual credentials so that each access point can be traced to a specific person. Role-based access controls (RBAC) should be applied to ensure that staff only have access to the systems they need for their roles, following the principle of "least privilege."

Temporary staff or emergency use of shared credentials must be controlled with additional security measures and strict monitoring.

Evidence to Provide:
Submit documentation such as:

Ensure your evidence demonstrates robust processes for verifying, authenticating, and authorising access to critical systems.

Indicators of Good Practice:

B2.b Device Management

Key Point:
Your organisation must maintain full visibility and trust in the devices that access your critical systems and information.

Overview:
This outcome focuses on ensuring that the devices used to access your information and systems are secure and managed properly. It includes both corporately-owned devices and privately-owned (BYOD) or third-party devices connected to your network.

How to Meet the Requirement:
Corporately owned and managed devices should be securely configured, and the number of BYOD or third-party devices should be minimised. If third-party devices are allowed, robust security measures, including malware scanning and network segmentation, should be in place. Devices used for privileged access, such as system administration, must meet the highest security standards.

Evidence to Provide:
Submit documents such as:

Ensure your evidence demonstrates how you manage and secure the devices accessing your critical systems.

Indicators of Good Practice:

B2.c Privileged User Management

Key Point:
Privileged access to systems must be closely managed, ensuring that only authorised and authenticated individuals have elevated access rights.

Overview:
This outcome ensures that privileged user accounts, which have higher access rights, are properly authenticated, monitored, and managed. Privileged users must only perform necessary administrative actions from trusted devices, and their activity must be logged and reviewed to detect any suspicious behaviour.

How to Meet the Requirement:
Track who has privileged access and ensure that access is immediately revoked when no longer required. Implement multi-factor authentication (MFA) for privileged accounts, and log all actions performed by these users. Review logs regularly and trigger active reviews when suspicious activity is detected.

Evidence to Provide:
Provide evidence such as:

Your documentation should show how you manage and monitor privileged users and their access rights.

Indicators of Good Practice:

B2 Identity and Access Control: Key Considerations

Initial Identity Verification:
Ensure all staff undergo pre-employment identity checks. The level of verification should depend on the sensitivity of the access required.

Role-Based Access Control (RBAC):
Implement RBAC to limit access according to job roles, applying the "least privilege" principle. Regularly review user access and ensure that rights are revoked promptly when no longer needed.

Device Security:
Limit the number of BYOD and third-party devices connected to your network. Ensure that devices used for privileged access are highly secure, following NHS and NCSC guidelines.

Protect your critical systems by ensuring your organisation has strong identity and access controls. Whether you need help setting up secure access protocols, managing privileged users, or evaluating device security, Periculo can help. Contact us today to strengthen your organisation’s access control strategy and prevent unauthorised access!

Protecting Digital Health Solutions

Contact Periculo for expert cyber security solutions tailored to the digital health industry.

Subscribe
Stay updated with our newsletter for the latest features and releases.
By subscribing, you agree to our Privacy Policy and consent to receive updates from us.
Thank you! Subscription received.
Oops! Something went wrong. Please try again.