Purpose
This standard outlines the requirements and guidelines for managing access control
within the University of North Carolina School of the Arts (UNCSA). It aims to ensure
that access to systems, resources, and data is granted based on appropriate authorization
levels and compliance with university policies.
Scope
This standard applies to all faculty, staff, students, contractors, and any other
individuals who interact with UNCSA IT resources. It governs the methods by which
access to information systems, physical facilities, and network resources is granted,
modified, or revoked.
Access Control Models
UNCSA will implement the following access control models:
1. Role-Based Access Control (RBAC)
Overview: Role-Based Access Control (RBAC) assigns access rights based on the roles of users
within the organization. Each user is assigned one or more roles, and each role has
permissions associated with it to access specific resources. This model simplifies
access control management by focusing on roles rather than individual users.
Key Principles:
- Roles Definition: Access rights are defined by roles (e.g., Student, Faculty, Staff, Administrator)
within the organization.
- Role Assignment: Users are assigned roles based on their job functions, responsibilities, or academic
status.
- Permissions: Access permissions (e.g., read, write, execute) to systems or resources are tied
to roles, not individual users.
- Least Privilege: Users should be granted the minimum level of access necessary to perform their job
duties.
- Separation of Duties: Critical functions should be divided among multiple roles to prevent conflicts of
interest and reduce the potential for fraud or error.
Example:
- Student Role: Access to course materials, student portal, and library resources.
- Faculty Role: Access to course materials, student grades, faculty portal, and administrative systems.
- Administrator Role: Full access to system configurations, student and staff management, and resource
allocation.
2. Attribute-Based Access Control (ABAC)
Overview: Attribute-Based Access Control (ABAC) grants access based on attributes of the user,
the resource, and the environment. Unlike RBAC, which relies on roles, ABAC evaluates
policies that combine multiple attributes such as the user’s department, location,
time of access, or the type of device used.
Key Principles:
- Attributes: Access decisions are based on the following types of attributes:
- User Attributes: Such as user role, department, group affiliation, security clearance, etc.
- Resource Attributes: Such as the sensitivity level of data, classification of a resource, or access type
(read/write).
- Environmental Attributes: Contextual elements such as the time of day, location of the user (e.g., on-campus
or off-campus), or type of device.
- Policies: Access decisions are made dynamically based on policies that combine user, resource,
and environmental attributes.
- Granular Control: ABAC provides fine-grained control over access, allowing for sophisticated rules
and conditions.
- Flexibility: ABAC allows organizations to create policies that can dynamically adapt to different
conditions or scenarios, such as granting access only during business hours or from
trusted devices.
Example:
- A faculty member may only access certain data if they are on-campus (location attribute)
during working hours (time attribute) and if the data classification is “public” (resource
attribute).
- A student may only access certain course materials if they are enrolled in the course
(user attribute) and if the resource is designated as “open access” (resource attribute).
Access Control Policy Guidelines
1. Access Request Process
- All access requests must be submitted through a standardized form or ticket system
and include the user's role, required resources, and justification for access.
- The request will be reviewed by the appropriate authority (e.g., IT department, department
head) before approval.
2. Access Approval and Review
- Access rights are granted based on the defined roles (RBAC) or attributes (ABAC).
- Access levels will be reviewed at least annually to ensure they align with each individual's
roles and responsibilities. IT Security will be responsible for notifying stakeholders,
tracking progress, and reporting on third-party system access reviews. Departments
will be accountable for conducting the reviews and verifying the appropriateness of
access for each of their third-party systems.
- Any changes in user status (e.g., role change, employment status) will trigger a review
of access rights.
3. Multi-Factor Authentication (MFA)
- Sensitive or high-risk systems and resources must require multi-factor authentication
(MFA) to further secure access.
4. Access Revocation
- When a user’s role or employment status changes, or if they no longer require access
to specific systems, their access rights will be promptly revoked.
- All access rights will be revoked for users leaving the university (e.g., graduates,
terminated employees).
5. Monitoring and Auditing
- Access logs will be maintained for all critical systems to monitor user activity and
detect any potential unauthorized access.
- Periodic audits will be conducted to ensure compliance with the access control policies.
Responsibilities
- IT Department: Responsible for the implementation, configuration, and maintenance of access control
mechanisms, including RBAC and ABAC policies.
- Department Heads: Ensure that access to departmental resources is consistent with the roles and needs
of faculty, staff, and students.
- End Users: Must adhere to the access policies and report any suspicious activity to the IT department.
Compliance
Non-compliance with this access control standard may result in disciplinary action,
including termination of access privileges, and further legal action if warranted.
Users found violating the access control policies may face suspension or expulsion
from the institution.
Conclusion
The University of North Carolina School of the Arts will implement a robust access
control system, combining both role-based and attribute-based models, to ensure that
only authorized individuals can access institutional resources. This approach balances
security, flexibility, and user convenience while maintaining compliance with institutional
and regulatory requirements.