Fictional Company: Acme Technologies
Author: John Doe Authorized Personnel: Jane Smith, Michael Johnson, Sarah Thompson
Accounts and Platforms:
- Cloud Platform A (Admin Access)
- Hosting Provider B (Admin Access)
- Application C (Admin Access)
- Database D (Admin Access)
Access Criteria: The Break Glass procedure can be initiated under the following circumstances:
- System Administrator John Doe is unreachable for more than 24 hours due to unforeseen circumstances.
- There is a critical issue impacting business operations that requires immediate action.
- Use an encrypted password management solution (e.g., LastPass) with multi-factor authentication (MFA).
- Grant access to the password vault only to authorized personnel.
- Share the master password and instructions securely with authorized personnel.
- Primary Communication: Secure messaging platform (e.g., Slack) for immediate communication.
- Secondary Communication: Email and phone calls as backup channels.
- In case of emergency, Jane Smith initiates the Break Glass procedure.
- Jane accesses the encrypted password vault using her authorized credentials.
- Jane retrieves the admin credentials for Cloud Platform A.
- Jane communicates the necessary information to Michael and Sarah via the primary communication channel.
- Michael and Sarah access the platform using the provided credentials and their own 2FA tokens to perform the required tasks.
- All actions performed using the Break Glass access are logged in the audit trail.
- The procedure for each platform follows a similar pattern as outlined above.
- The authorized personnel initiate the Break Glass procedure and follow the specific instructions for each platform.
- Conduct quarterly reviews of the Break Glass plan to ensure its effectiveness and accuracy.
- Update the plan as needed based on changes in personnel, access requirements, or platforms.
- Schedule and perform regular tests or simulations to validate the plan and identify areas for improvement.
- All authorized personnel undergo annual security training covering confidentiality, secure handling of credentials, and compliance with the Break Glass procedures.
- Regularly remind authorized personnel of the Break Glass plan and their responsibilities.
- Maintain detailed documentation outlining the Break Glass procedures for each platform.
- Document the contact information of authorized personnel and any necessary instructions or protocols.
- Enable comprehensive audit logging for all actions performed using Break Glass access.
- Regularly review the audit logs to ensure accountability and detect any unauthorized or suspicious activities.
- Conduct annual drills or simulations to test the effectiveness of the Break Glass plan.
- Evaluate the performance of authorized personnel and identify areas for improvement.
Please note that this is a fictional example. Adapt the plan to fit your organization's specific needs, platforms, and access requirements.