- Introduction and Principles
- To protect the integrity and confidentiality of institutional data, Chattanooga State shall control access to information technology resources based on the following three security principles:
- Individual Accountability: Every user must be uniquely identified so that actions can be traced to a specific individual.
- Least Privilege: Access rights shall be limited to the minimum permissions necessary for a user to perform their job duties.
- Need to Know: Access is granted only for the information required to fulfill authorized institutional functions.
- Scope
- This policy applies to all students, faculty, staff, contractors, and guests who are permitted access to College systems or data, including access through personal equipment.
- Identification and Authentication
- Unique Identification: Every authorized user will be assigned a unique identification. Generic or shared accounts should be avoided when possible. When shared credentials are unavoidable, users must share credentials through a password manager with auditable logs of the usage of the shared credentials.
- Multi-Factor Authentication (MFA): MFA is required for all users accessing public-facing critical systems, including email, VPN, and the institutional ERP.
- Credential Protection: Users are responsible for all activity performed under their account and shall not share passwords or MFA methods with others.
- Password Standards
- The Technology Division publishes and maintains a procedure specifying complexity requirements for passwords or alternative approved user authentication methods. This procedure will be updated to reflect guidance from the National Institute of Standards and Technology and the Tennessee Board of Regents.
- Account Lifecycle Management
- Provisioning: Access is granted based on automated triggers from data initially entered into the ERP during the hiring process (for employees) or the admissions process (for students).
- Changes in Roles: As individuals change roles within the College, their access will be adjusted accordingly. Examples include (but are not limited to) employees with interim assignments, employees changing jobs entirely, employees serving as adjunct instructors, employees enrolling in classes as students, students accepting employment on temporary contracts, etc. An individual’s access profile at any given time should reflect only their active roles.
- The specific access to be granted as roles are assigned (and revoked as those roles are unassigned) is specified by relevant data owners / data custodians across the College and implemented by the Technology Division.
- Revocation: Individuals with no remaining active roles will have all access revoked.
- Periodic Cleanup: In addition to adjusting access in real time as roles change, the Technology Division will conduct periodic cleanup efforts to confirm that users’ current access matches their approved roles.
——————————————————————————–
References:
1. TBR Policy 1.08.03.00 (Digital Identity, Authentication Management, and Access Control)
2. TBR Policy 1.08.01.00 (Enterprise Information Systems Updates)
Submitted to Policy Review Committee on March 2, 2026
Submitted to Policy Review Board on April 13, 2026
Approved by Policy Review Board on April 29, 2026
Previous Versions:
Approved by Policy Review Board on November 20, 2024
Approved by the Policy Review Board on April 13, 2022
Approved by Policy Review Board on April 21, 2021
Approved by Policy Review Board on July 31, 2019
Approved by Policy Review Board on December 6, 2018 as Policy 08:13:01, Computer Passwords
|