{"id":871,"date":"2024-05-31T20:00:31","date_gmt":"2024-05-31T20:00:31","guid":{"rendered":"https:\/\/www.tarleton.edu\/security-controls-catalog\/?page_id=871&#038;preview_id=871"},"modified":"2024-09-06T21:52:43","modified_gmt":"2024-09-06T21:52:43","slug":"access-control-ac","status":"publish","type":"page","link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/","title":{"rendered":"Access Control (AC)"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-large-font-size\">Access Control (AC)<\/h1>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Purpose &#8211;<\/strong>&nbsp;<\/h2>\n\n\n\n<p>The Access Control Policy and associated controls describe the requirements for providing access to Tarleton State University (Tarleton) information resources. Requirements are defined for managing accounts and implementing access controls, separation of duties, and least privilege.&nbsp;&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-tarleton-purple-color has-alpha-channel-opacity has-tarleton-purple-background-color has-background is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Scope and Roles &#8211;&nbsp;<\/strong>&nbsp;<\/h2>\n\n\n\n<p>This policy applies to information resources owned or managed by Tarleton. The intended audience includes the Tarleton Chief Information Officer (CIO), Deputy CIO, Chief Information Security Officer (CISO), and Information Resource Owners and Custodians.&nbsp;&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-tarleton-purple-color has-alpha-channel-opacity has-tarleton-purple-background-color has-background is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Compliance &#8211;<\/strong>&nbsp;<\/h2>\n\n\n\n<p>The Access Control Policy and associated controls are implemented to ensure compliance with the Texas Department of Information Resources (DIR) Security Control Standards Catalog as required by <a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=76\" data-type=\"link\" data-id=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=76\" target=\"_blank\" rel=\"noreferrer noopener\">Title 1 Texas Administrative Code \u00a7202.76<\/a> and <a href=\"https:\/\/policies.tamus.edu\/29-01-03.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Texas A&amp;M University System Regulation 29.01.03, Information Security<\/a>.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Access Control (AC) Purpose &#8211;&nbsp; The Access Control Policy and associated controls describe the requirements for providing access to Tarleton State University (Tarleton) information resources. Requirements are defined for managing &#8230;<\/p>\n","protected":false},"author":94,"featured_media":580,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-871","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/author\/jgeorge\/","display_name":"jgeorge"},"relative_dates":{"created":"Posted 2 years ago","modified":"Updated 2 years ago"},"absolute_dates":{"created":"Posted on May 31, 2024","modified":"Updated on September 6, 2024"},"absolute_dates_time":{"created":"Posted on May 31, 2024 8:00 pm","modified":"Updated on September 6, 2024 9:52 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/comments?post=871"}],"version-history":[{"count":0,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/871\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/media?parent=871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}