9-3.1 Authorization Principles

Access must be granted based on personnel roles and the security principles of clearance, need to know, separation of duties, and least privilege.

9-3.1.1 Clearances

For personnel without appropriate clearances or background investigations, access is restricted to temporary information services. Managers must use eAccess to request access authorization for individuals who do not have the appropriate clearance and are responsible for the access activities of those individuals.

9-3.1.2 Need to Know

For sensitive-enhanced, sensitive, and critical information resources access must be limited in a manner that is sufficient to support approved business functions. Access to sensitive-enhanced and sensitive Postal Service information resources must be limited to personnel who need to know the information to perform their duties.

9-3.1.3 Separation of Duties

Only authorized personnel are approved for access to Postal Service information resources. This approval must be specific to an individual’s roles and responsibilities in the performance of his or her duties and must specify the type of access (e.g., read, write, delete, and execute); specific resources and information; and time periods for which the approval is valid. Separation of duties and responsibilities are considered when defining roles. For special situations where additional control is required, dual authorization can be implemented.

9-3.1.4 Least Privilege

For sensitive-enhanced, sensitive and critical information resources access is based on providing personnel with the minimum level of information resources and system functionality needed to perform their duties. Systems and applications must define as many levels of access as necessary to prevent misuse of system resources and protect the integrity and confidentiality of Postal Service information. Postal Service information resources must be capable of imposing access control based on specific functions (e.g., create, read, update, delete, and execute).