Document Name: NCSA CUI Access Control Standard
Version: 1.2
Accountable: James Eyrich
Authors: Margaret Johnson, Douglas Fein

Reviewed: Dec 8, 2023
Approved: Dec 14, 2023 by IIB


This document specifies the procedures for granting, revoking and auditing access control to systems processing or storing CUI (Controlled Unclassified Information).


These processes applies to all CUI users apply only to staff in the NCSA Staff with ACHE Access. NCSA customers are responsible for authorization decisions of their own staff and can manage their access control groups directly. A Principal Investigator (PI) is responsible for authorization decisions for their project teams and can modify group credentials directly. Regardless of the approval process, NCSA will record the access changes made by customers or PIs to ACHE resources through its authorization framework.


NCSA will track approvals and changes made to access groups, keeping records for 6 years or from the inception of the program. Each step of the following workflows is approved by a member of the NCSA Staff with ACHE Access while logged in with their personal credentials, and each approval sends emails to the approver and other relevant parties.

Alerts are sent to the Security Office and HIPAA Liaison anytime there are direct modifications to the group management system that were not triggered by the approval workflow engine. Such legitimate changes are checked for by automated systems at least daily.


NCSA staff must be within the NCSA Staff with ACHE Access to make a valid request to be added to a system access group for system processing or storing CUI. Being in the NCSA Staff with ACHE Access itself does NOT grant any access, which must instead be requested by the staff member via the following process.

  1. Staff member submits request for access with the stated reason for the request. This request contains the requested access group name. 
  2. Staff member's manager approves or rejects the request.
  3. Approved request proceeds to the HIPAA Liaison who considers the staff member's role and reason for the request.
  4. The HIPAA Liaison verifies that the person has taken approved CUI training.
  5. User verifies device encryption
    1. NCSA employees must use the WorkspaceOne tool to have their machine encryption verified
    2. Other users will provide a screen shot of their encryption and attest to the continued use of encryption for connection to Nightingale.
  6. If approved and they are in the NCSA Staff with ACHE Access group, they are added to the requested group(s).
  7. Emails are sent to the staff member, their manager and the HIPAA Liaison.


Deauthorization can happen automatically or by request. For example, being removed from the staff group upon leaving the NCSA will automatically remove one from the NCSA Staff with ACHE Access and by consequence from any access group for systems with CUI. Therefore, even if a person leaves NCSA and has another legitimate reason for access in another unit, they will have to be reapproved by a PI in that unit to be added to the necessary group(s) for their project. The security office can also disable credentials and remove anyone from any group at anytime, though an alert will be sent to them and the HIPAA Liaison.

Employees, their managers, and the Lead of Trust, Compliance and Risk Management can request de-authorization as well via the following workflow.

  1. Employee requests removal with justification and the access control groups they need to be removed from. (Optional: Can start with their manager)
  2. Request is received by (or starts with) the employee's manager who approves the request or fills in the same details if they start the request. (Optional: Can start with the HIPAA Liaison).
  3. The HIPAA Liaison either receives the request or starts a new one specifying the person and which groups they are to be removed from.
  4. If approved, the person is removed from the access control groups.
  5. Emails are sent to the staff member, their manager and the HIPAA Liaison.


All NCSA group owners are required to review group membership annually and approve or modify it. This includes customers and their point of contact and PIs at the University. Access control groups that provide access to systems with CUI are owned by the Lead of Trust, Compliance and Risk Management who must do the same, or the group is suspended automatically.

  • No labels