Definitions
Each unit or department’s executive or department head will designate at least two, but not more than four, DSAs. DSAs will act as liaisons to the BU Information Security Team. DSAs oversee data security responsibilities at the department level. DSA responsibilities include: A new DSA’s manager should ensure the new DSA receives a written description of his or her duties as DSA and receives the appropriate training. (The DSA duties list, manual and training are maintained and provided by BU Information Security.) The DSA must acknowledge the responsibilities by signing and returning a copy to his or her manager and to BU Information Security.Departmental Security Administrator (DSA)
The executive or head of each department will designate at least two, but not more than four, Data Trustees. Data Trustees are those persons at the University with responsibility for the accuracy, integrity, and privacy of University data. They grant or deny access to University data, monitor the integrity of the data repositories, and perform regular audits to ensure all approved accesses still valid and appropriate. Data Trustees must make decisions regarding the handling of data in accordance with the University’s Information Security Policy and the Data Protection Standards, and in compliance with all federal, state, and local laws and regulations. Data Trustees are responsible for reviewing requests for access to sensitive data under their care regardless of whether the data is stored in the original data source, the authoritative repository or with any downstream users of the data. Data Trustee responsibilities include: In the event a Data Trustee is unavailable to fulfill the responsibilities above, the executive or department head must designate an alternate until the Data Trustee is again available.Data Trustee
In general these authorizations are granted by “Data Custodians”, who are entrusted with the maintenance of the data. These are typically Systems Administrators, Database Administrators, or Application Administrators. These individuals are responsible for executing the approved account definition/modification/removal request, after validating that appropriate approvals have been granted. Data Custodian responsibilities include: If a Data Trustee has previously approved access to the data using one format or method, the Data Custodian need not get a new approval for a different format or method. For example, if access via spreadsheet or database is approved and the client would like it in a text file instead, this change does not require re-approval by the Trustee. Similarly, as long as the data is being transported using a mechanism approved by BU Information Security, changing from one to the other does not require re-approval. For example, switching from SFTP to FTP-S as the secure transport mechanism. A new Data Custodian’s manager should ensure that the new Custodian receives a written description of his or her duties as Custodian and receives the appropriate training. The Custodian must acknowledge the responsibilities by signing and returning a copy to his or her manager.Data Custodian
Frequently Asked Questions
Depending on the system and access being requested, Information Security can perform several roles in the process including, consultant, request reviewer, access auditor, request and implementer. Information Security can also assist any requestor or approver who need help with the process, or with tracking a request.What is Information Security’s role in the request process?
In general, requests should be completed within 5 business days of the submitted request. While requests are typically fulfilled quicker than that, keep in mind there are multiple stages of the request/approval process where a request can reside.How long does it typically take for a request to be processed?
Yes. We have manuals, guides, and other resources available here.I'm a DSA/Data Trustee, do you have any documentation online for me to reference?
To become a DSA simply have an existing DSA in your department send us a ServiceNow ticket with the request. If your department doesn’t currently have a DSA, send us the request yourself. You will then be required to attend DSA training.How do I become a DSA?
You can find our Training schedule here.How do I sign up for DSA training?
An authorization should only provide the privileges required for the function to be performed and no more. Following this principle helps ensure proper workflows are followed and access to functions that may expose data is contained as much as possible.What is the concept of ‘Least Privilege’?
When an authorization is granted to an account it must be approved by multiple individuals. Multiple approvers ensures that the Principle of Least Privilege is followed from both a technical and process perspective, decreases opportunity for conflict of interest or fraud, and reduces the risk of error. As applied to authorization, separation of duties requires that the administrative and technical approver are not the same person, or if they must be, then the Data Custodian is not filling either role.What are Separation of Duties?
In general access given in Test systems is not as restrictive as Production systems. Since clients typically do not have access to non-production systems, access requests are typically performed by technical team members. Requests should still have a business need, and may still need approval from a Manager, Business Owner, Information Security, and potentially a Data Trustee (specifically if Restricted Use data is involved)Is there any difference when requesting access in Test or Production?
Before granting access to a system or application, the following policy must adhered to:What kind of things should be considered before an access request is approved?
*More information can be found in the Data Management Guide
