Skip to content

Access

Last Reviewed: 2025-02-17:19:44:43-UTC

Access to APS systems and application is limited for all users, including but not limited to workforce members, volunteers, business associates, contracted providers, consultants, and any other entity, is allowable only on a minimum necessary basis. All users are responsible for reporting an incident of unauthorized user or access of the organization’s information systems.

Policy Statements

Access Control Policy

APS policy requires that

(a) Access to all computing resources, including servers, end-user computing devices, network equipment, services and applications, must be protected by strong authentication, authorization, and auditing.

(b) Interactive user access must be associated to an account or login unique to each human user.

(c) All credentials, including user passwords, service accounts, and access keys, must meet the length, complexity, age, and rotation requirements defined in APS security standards.

(d) Use strong password and multi-factor authentication (MFA) whenever possible to authenticate to all computing resources (including both devices and applications).

(e) MFA is required to access any critical system or resource, including but not limited to resources in APS production environments.

(f) Unused accounts, passwords, access keys must be removed within an established timeframe.

(g) A unique access key or service account must be used for different application or user access.

(h) Authenticated sessions must time out after a defined period of inactivity.

Access Authorization and Termination

APS policy requires that

(a) Access authorization shall be implemented using role-based access control (RBAC) or similar mechanism.

(b) Standard access based on a user’s job role may be pre-provisioned during employee onboarding. All subsequent access requests to computing resources must be approved by the requestor’s manager, prior to granting and provisioning of access.

(c) Access to critical resources, such as production environments, must be approved by the security team in addition to the requestor’s manager.

(d) Access must be reviewed on a regular basis and revoked if no longer needed.

(e) Upon termination of employment, all system access must be revoked and user accounts terminated within the defined, predetermined timeframe.

(f) All system access must be reviewed at least annually and whenever a user’s job role changes.

Shared Secrets Management

APS policy requires that

(a) Use of shared credentials/secrets must be minimized and approved on an exception basis.

(b) If required by business operations, secrets/credentials must be shared securely and stored in encrypted vaults that meet the APS data encryption standards.

(c) Usage of a shared secret to access a critical system or resource must be supported by a complimenting solution to uniquely identify the user.

Privileged Access Management

APS policy requires that

(a) Users must not log in directly to systems as a privileged user.

  • A privileged user is someone who has administrative access to critical systems, such as a Active Directory Domain Administrator, root user to a Linux/Unix system, and Administrator or Root User to an AWS account.

(b) Privilege access must only be gained through a proxy, or equivalent, that supports strong authentication (such as MFA) using a unique individual account with full auditing of user activities.

(c) Direct administrative access to production systems must be kept to an absolute minimum.

Controls and Procedures

Standards for Access Provisioning

Workforce Clearance

  1. The level of security assigned to a user to the organization’s information systems is based on the minimum necessary amount of data access required to carry out legitimate job responsibilities assigned to a user’s job classification and/or to a user needing access to carry out treatment, payment, or healthcare operations.
  2. All access requests are treated on a “least-privilege” principle.
  3. APS maintains a minimum necessary approach to access to Customer data.

Access Authorization

  1. Role based access categories for each APS system and application are pre-approved by the Security Officer.
  2. APS utilizes hardware-defined and/or software-defined boundaries to segment data, prevent unauthorized access, and monitor traffic for denial of service attacks.

Person or Entity Authentication

  1. Each workforce member has and uses a unique user ID and password that identifies him/her as the user of the information system.
  2. Each Customer and Partner has and uses a unique user ID and password or OpenID Connect that identifies him/her as the user of the information system. This is enforced through the use of AWS Cognito.
  3. All customer support interactions must be verified before APS support personnel will satisfy any request having information security implications.

Unique User Identification

  1. Access to the APS Platform systems and applications is controlled by requiring unique User Login IDs and passwords for each individual user and developer.
  2. Passwords requirements mandate strong password controls (see below).
  3. Passwords are not displayed at any time and are not transmitted or stored in plain text.
  4. Default accounts on all production systems and environments, including root, are disabled/locked.
  5. Shared accounts are not allowed within APS systems or networks.

Automatic Logon and Logoff

  1. Automated log-on configurations that store user passwords or bypass password entry are not permitted for use with APS workstations or production systems.

    • Automatic log-on may only be permitted for low-risk systems such as conference room PCs connecting to a Zoom Room.
    • Such systems are configured on separate network VLANs.
  2. Users are required to make information systems inaccessible by any other individual when unattended by the users (ex. by using a password protected screen saver or logging off the system).

  3. Information systems automatically lock users such as enabling password-protected screensaver after 10 minutes or less of inactivity.

Password Management

  1. User IDs and passwords are used to control access to APS systems and may not be disclosed to anyone for any reason.
  2. Users may not allow anyone, for any reason, to have access to any information system using another user’s unique user ID and password.
  3. On all production systems and applications in the APS environment, password configurations are set to require:

    • a minimum length of 8 characters;
    • a mix of upper case characters, lower case characters, and numbers or special characters;
    • prevention of password reuse using a history of the last 24 passwords;
    • where supported, modifying at least 6 characters when changing passwords;
    • account lockout after 5 invalid attempts.

    Exceptions

    Password expiration may be set to a greater interval if an account is always protected by MFA.

  4. All system and application passwords must be stored and transmitted securely.

    • Where possible, passwords should be stored in a hashed format using a salted cryptographic hash function (SHA-256 or stronger NIST compliant standard).
    • Passwords that must be stored in non-hashed format must be encrypted at rest pursuant to the requirements in Data Protection.
    • Transmitted passwords must be encrypted in flight pursuant to the requirements in Data Protection.
  5. Each information system automatically requires users to change passwords at a pre-determined interval as determined by the system owner and/or Security, based on the criticality and sensitivity of the data contained within the network, system, application, and/or database.

  6. Passwords are inactivated immediately upon an employee’s termination (refer to the Employee Termination Procedures in HR policy).
  7. All default system, application, and Vendor/Partner-provided passwords are changed before deployment to production.
  8. Upon initial login, users must change any passwords that were automatically generated for them.
  9. Password change methods must use a confirmation method to correct for user input errors.
  10. All passwords used in configuration scripts are secured and encrypted.
  11. If a user believes their user ID has been compromised, they are required to immediately report the incident to the Security team.
  12. In cases where a user has forgotten their password, password reset procedures provided by the IdP shall be followed. The exact process depends on the system or application. If help is needed, users shall contact Helpdesk or Security
  13. An approved password manager is used for to store or share non-critical business application passwords that are not integrated with our primary IdP through SSO.

    • The password manager locally encrypts the password vault with the user’s master password before synchronizing to the cloud.
    • The master password must follow the password requirements listed above.
    • MFA must enabled in the password manager configuration.
    • Enrollment of the password manager is configured as an application in Google Workspaces.
  14. An automated process/tool is implemented to ensure compromised passwords or common dictionary words are not used as passwords. This is currently implemented in Google Workspaces.

Single Sign On

  • APS selected Google Workspaces as its primary Identity Provider (IdP) to control user access to systems and business applications.

  • Single sign-on (SSO) should be used whenever possible instead of local authentication. This centralized approach improves user experience and simplifies access management.

  • SSO is configured via industry standard SAML protocol between the IdP (Google Workspaces) and the target application.

  • APS will not configure SSO to target applications unless they score a “B” rating or higher on the Qualys SSL Labs benchmark.

  • Security team is responsible for the administration of the IdP / SSO system, including user and access provisioning. Security team may delegate administrative privilege to a subset of the system, such as a specific application.

Multi-factor Authentication

Multi-factor authentication (MFA) is a standard control used by APS to provide strong access control to critical systems and applications, and should be enabled whenever possible.

Purpose
The purpose of this policy is to provide guidelines for the use of multi-factor authentication (MFA) when accessing Above Property resources. These standards are designed to minimize the potential security exposure to Above Property from damages which may result from unauthorized use of APS resources. MFA adds a layer of security that helps deter the use of compromised credentials.

Scope
The policy applies to all members of the Above Property community, including all employees, contractors, board members, and affiliates who connect to Above Property associated network or technology resources. This policy applies to any system accessing Above Property or customer data where MFA can be utilized.

Definitions

  • Multi-factor authentication: Using two or more factors to validate the identity of a user.
  • Factor (of authentication): There are five are types of factors used in combination together resulting in multi-factor authentication. They are:
    • Something the user knows (username and password)
    • Something the user has (an item the user physically carries with them)
    • Something the user is (biometrics: fingerprints, face scan, etc.)
    • Somewhere the user is (geo location, on premises)
    • Something the user does (keystroke patterns)

Policy
All individuals are required to engage in one additional step beyond the typical username/password login process to access Above Property and affiliated systems. Individuals are required to register and to use an approved MFA device (sometimes called a security key) wherever such devices are supported. If physical devices are not supported, individuals are required to make use of MFA software, such as Google Authenticator or Authy. Individuals must not use SMS (text message) based MFA unless the affiliated resource supports no other option. In the case that an affiliated resource only supports SMS based MFA, the individual must report this to the Information Security Officer.

MFA is required for all externally-exposed enterprise or third-party applications, where supported. Enforcing MFA through a directory service or SSO provider is a satisfactory implementation of this safeguard.

MFA is required for all administrative access accounts, where supported, on all enterprise assets, whether managed on-site or through a third-party provider.

Responsibilities
Above Property will supply each covered individual with one MFA device. Individuals may supply their own backup devices if desired. It is the individual’s responsibility to promptly report compromised credentials to the Information Security team. It is the individual’s responsibility to promptly report a lost or stolen MFA device to the Information Security team.

Exemptions
There may be situations in which an individual has a legitimate need to utilize technology resources outside the scope of this policy. The Information Security team must approve, in advance, exception requests based on balancing the benefit versus the risk to the company.

Enforcement
This policy regulates the use of all MFA access to APS network, software, and external resources. All users users must comply with this policy, as directed in the Policy Compliance Policy. Services will be disabled immediately if any suspicious activity is observed. Service will remain disabled until the issue has been identified and resolved.
Any covered individual found to have intentionally violated or ignored this policy will be subject to loss of privileges or other actions, as specified in the Policy Compliance Policy.

Important

Approved MFA methods include:

  • Passkeys (preferred. See the Passkey section below.)
  • Hardware MFA token (preferred where passkeys are not available; APS provides Yubikey tokens for all staff, contractors, and board members)
  • A unique cryptographic certificate tied to a device
  • Time-based One-Time Password (TOTP) delivered through a mobile app, such as Google Authenticator
  • One-time passcode delivered through SMS text message (if and only if it is the only supported option)
  • Secure physical facility (if the system or application can only be accessed at that location)

Authentication via passkey

APS strongly encourages users to make use of passkeys wherever they are available. Passkeys use public key cryptography to generate strong user credentials that are tied to a single web site or application. To make sure only the rightful owner can use a passkey, the system will ask them to unlock their device. This may be performed with a biometric sensor (such as a fingerprint or facial recognition), PIN, or pattern.

Passkeys are suppored directly in Google Chrome, Android devices, iPhone and MacOS and in the 1Password password manager. As of September 2023, the Firefox browser does not support passkey operations, and as a result APS discourages the use of Firefox.

Passkey authentication is significantly stronger and more robust than username/password + MFA authentication, and is the preferred method of authentication at APS for all sites and applications that support it.

Role Based Access Control (RBAC)

By default, user access is granted based on the user’s job function / role. For example:

  • Developer
  • Security
  • IT
  • Administrative
  • Marketing / Sales

This is defined as user groups in Google Workspaces.

Access to sensitive data and production customer data is highly restricted and further defined in its own section.

Temporary Access to AWS Accounts and Resources

Access to APS AWS accounts are permissible through temporary credentials / sessions only. No persistent users, passwords or access keys are allowed in AWS IAM configurations for end-user access, either to the AWS console or AWS CLI. This is achieved with the following processes:

AWS Console Access

  • An organization master account (APS-master) in AWS is configured with IAM roles such as Developer and Security.
  • SAML SSO and trust relationship is established between the roles in APS-master and an “AWS application” provisioned in AWS Identity Center.
  • Users are assigned their corresponding roles through application and role assignment in Google Workspaces.
  • Via SSO, Users authenticate through Google Workspaces by using their APS Google username, password, and MFA.
  • Upon successful authentication and MFA validation, users are logged into APS-master using AWS Assume Role capability.
  • The roles in APS-master by default has highly restricted access. For example, the Developer role does not have access to any services and resources in the master account.
  • The user is required to Assume a Role in a sub-account, connected via cross-account trust policy defined at account bootstrap or through an approved change management process. For example, a Developer may be able assume the Administrator role in APS-dev, which is the sandboxed development environment in a separate AWS account.
  • Assume Role access to a production AWS account is highly restricted.

    • Developers can only assume the Developer role in production which only has access to read CloudWatch logs, XRay system traces/service maps, CloudWatch metrics, resource group inventories, and CloudWatch dashboards.
    • Security can only assume the Auditor role in production which has the default Auditor IAM policy managed by AWS. This policy allows read-only access to account and resource configurations, but does not allow read access to any data such as S3 objects.

AWS CLI/SDK Access

  • granted/assume is used to obtain temporary credentials (access keys) for developers to connect to AWS using the CLI or SDK.
  • Using granted/assume, users are prompted to authenticate to Google Workspaces using their APS credentials and MFA token/app.
  • Upon successful authentication and MFA validation, a temporary session token is inserted into the user’s local environment.
  • This temporary credential expires after one hour and a new temporary credential must be obtained for access.
  • Additional details are documented on the Development Wiki.

IAM Safety

  • APS implements AWS Security Hub to monitor and protect its AWS environments.
  • AWS Access Analyzer works by defining a set of risky actions, such as adding/remove IAM users to an Explicit Deny policy. The policy is attached to an IAM Group, and protected Users and/or Roles are assigned to this Group.
  • Because explicit deny rules always take precedence in AWS IAM policy, this effectively restricts access and prohibits execution of the risky actions as defined in the policy, even if the user/role may have administrative privilege.
  • Privilege Roles, such as Security role in master account and Administrator role in production account, are protected by IAM Safety.

Troubleshooting / Support Access

In normal operations, troubleshooting is performed with log analysis in DataDog, outside of the production environments in AWS. A separate Support role is created for temporary troubleshooting and support access when log access is insufficient to determine the cause. Support access should be minimized and is designed to involve manual approval and provision process.

  • The Support role by default is NOT assigned to anyone.
  • The Support role is configured with Read level access to the services used by APS platform services and applications. It does NOT have permission to make any configuration changes and does NOT have access to production data.
  • An Infrastructure (IN) ticket is used to request temporary support access and must be approved by Head of Engineering and Security.
  • Upon approval of the support access IN ticket, Security grants the requestor temporary access to by assigning the Support role to that particular individual user in Microsoft 365.
  • The Support role is protected by Azure Active Directory and it must be explicitly allowed by the Security team for it to assume the Support role in the target production environment.
  • By default, temporary Support access is limited to one hour. This can be extended by the Security team.
  • The role assignment is removed from Microsoft 365 immediately after the support session.

Remote Access / VPN

  • VPN remote access to non-production and non-privileged environments in AWS are permissible and implemented using AWS VPN.

Platform Customer Access to Systems

APS does not allow direct system access by customers. Access is only available through the Web UI or API interface, with valid authentication and authorization detailed in the Product Security, Architecture, and Security pages of the engineering wiki.

Access Establishment, Modification and Termination

  1. Requests for access to APS Platform systems and applications is made formally using the following process:

    1. An access request is created in Rally through either the new employee onboarding request or a specific access request from APS Internal Support site.
    2. The Security team will grant standard access to per job role as part of new employee onboarding. A standard set of accounts that are default for all employees are created as part of the onboarding process. This includes

      • User account for local system/laptop
      • Microsoft 365 user in the Everyone group, and additional group based on role such as Development, IT, Security
      • Google Workspaces account for access to email, documents, etc.
      • HR accounts for paperwork, benefits management, payroll, expense reporting, etc.
      • Additional role based access (e.g. GitHub and Jenkins access for a developer)
    3. Standard access may be provisioned at any time by account owners/administrators at any time during or after onboarding with approval of account owners and/or manager.

    4. If additional access is needed in addition to the above, a separate access request (through Rally) is required and the requester must include a description and justification as part of the access request.
    5. Once the review is completed, the Security team approves or rejects the Issue. If the Issue is rejected, it goes back for further review and documentation.
    6. If the review is approved, IT or Security team provisions access, then marks the Issue as Done, adding any pertinent notes required.

      • New accounts will be created with a temporary secure password that meets all password requirements, which must be changed on the initial login.
      • All password exchanges must occur over an authenticated channel.
      • For on-premise systems, access grants are accomplished by adding the appropriate user account to the corresponding LDAP/AD group.
      • For cloud accounts, access grants are provisioned in Microsoft 365 or using the access control mechanisms built into those services/applications.
      • Account management for non-production systems may be delegated to a APS employee at the discretion of the Security Officer.
  2. Special access, including access to production environments, is not granted until receipt, review, and approval by the APS Security Officer.

  3. The request for access is retained for future reference.
  4. Temporary accounts are not used unless absolutely necessary for business purposes.

    • Accounts are reviewed every 90 days to ensure temporary accounts are not left unnecessarily.
    • Accounts that are inactive for over 90 days are removed.
  5. In the case of non-personal information, such as generic educational content, identification and authentication may not be required.

Access Termination

IT Manager or Security team receives access termination requests in one of the following conditions and processes it accordingly:

  • Employee existing/termination, as defined by the process in HR & Employee Security;
  • Employee access to a system is no longer required as a result of job role change or similar event, in which case a access termination request may be submitted by the employee or his/her manager via the Internal Help portal or an email request to Security team;
  • As the result of a Access Review, as defined in System Auditing.
  • Non-standard access is revoked by default after 30 days of inactivity, unless an exception/extension is requested and approved.

Access Reviews

  • All access to APS systems and services are reviewed and updated following the procedures specified in System Auditing to ensure proper authorizations are in place commensurate with job functions.
  • In cases of increased risk or known attempted unauthorized access, immediate steps are taken by the Security Officer to limit access and reduce risk of unauthorized access.

Service Accounts

  • All application to application communication using service accounts is restricted and not permitted unless absolutely needed. Automated tools are used to limit account access across applications and systems.

  • Services that are part of APS platform leverage AWS IAM policy configurations and/or OAuth for authorization.

  • Generic accounts are not allowed on APS systems.

  • Direct system to system, system to application, and application to application authentication and authorization are limited and controlled to restrict access.

  • In AWS, service accounts are implemented in the form of IAM Roles, and their access defined by the corresponding IAM policies. The creation of these IAM roles and policies is implemented as code, which follows the secure development, review and production change approval process.

  • An inventory of all Service accounts is maintained by AWS IAM and CloudFormation and reviewed periodically.

Employee Workstation / Endpoints Access and Usage

All workstations at APS are company owned, using one the following approved hardware vendors and operating systems:

  • Apple, Dell, or Lenovo
  • macOS, Linux (Ubuntu or Debian), or Windows 10
  1. Workstations may not be used to engage in any activity that is illegal or is in violation of organization’s policies.
  2. Access may not be used for transmitting, retrieving, or storage of any communications of a discriminatory or harassing nature or materials that are obscene or “X-rated”. Harassment of any kind is prohibited. No messages with derogatory or inflammatory remarks about an individual’s race, age, disability, religion, national origin, physical attributes, sexual preference, gender identification, or health condition shall be transmitted or maintained. No abusive, hostile, profane, or offensive language is to be transmitted through organization’s system.
  3. Information systems/applications also may not be used for any other purpose that is illegal, unethical, or against company policies or contrary to organization’s best interests. Messages containing information related to a lawsuit or investigation may not be sent without prior approval.
  4. Solicitation of non-company business, or any use of organization’s information systems/applications for personal gain is prohibited.
  5. Users may not misrepresent, obscure, suppress, or replace another user’s identity in transmitted or stored messages.
  6. Workstation hard drives will be encrypted using FileVault (macOS), BitLocker (Windows) or equivalent.
  7. All workstations must have host firewalls enabled to prevent unauthorized access unless explicitly granted.
  8. All workstations must have endpoint security software installed and actively running, if supported by the operating system.

Production Access and Secrets Management

APS leverages a combination of Jenkins credentials store, Amazon Secrets Manager, and Amazon EC2 Systems Manager Parameter Store to securely store production secrets. Secrets are always encrypted; access to secrets is always controlled and audited.

Details and usage are documented on the APS Engineering Wiki.

Production Data Access

The following requirements and controls are in place for accessing production data by internal personnel:

  • There is no pre-provisioned, persisted “internal” access to production data stores. Access such as direct SSH to the production database servers and direct access to data objects in production S3 buckets are prohibited.

  • Access to customer data is granted on a per-account basis.

  • Access requests follow the same production access processes. Access must be approved by both the data owner and the security team.

  • Access to production data is granted only through an approved platform with strong centralized access control, with MFA.

  • An audit list of who has access to which customer data is maintained and reviewed monthly. Access is revoked when no longer needed.

Password Reset and other Helpdesk Requests

APS employees have the ability to obtain self-service support directly from supported business applications, such as password reset via the SSO/IdP tool.

If needed, users may use our internal service desk or email request to obtain IT and Security support.

A ticket is opened in Rally for each support request and assigned to the appropriate personnel. The person assigned must verify the identity of the requester and ensure the ticket has appropriate approval before implementing or providing support. The verification step and confirmation of “User identity verified” should be included as a comment in the ticket by the support personnel. Additionally, if a password or security credential has been created or supplied, confirm user has received it via another channel like slack/email/phone/zoom and document receipt in the ticket.