Security Policy for Access to State Financial Systems

Security Policy

Please refer to Chapter 8: Section 1, of the Fiscal Procedures Manual for the most current version of the Statewide Security Policy for Access to the State Financial System.

Security Administration for State Financial Systems

The State Controller may delegate security administration responsibility to department controllers.  These agencies must demonstrate the ability to adequately maintain security over the processing of transactions and access of information in the Colorado Financial Reporting System (COFRS).

Questions about security administration should be directed to the Statewide Security Administrator, Susan Thomson, at (303) 866-4161.

 


Procedures

For all state agencies except for Institutions of Higher Education: 

For Top Secret User ID:

Users must have a Top Secret user ID for the State Mainframe if they will be using the Colorado  Payroll Personnel System (CPPS) on the mainframe.

To obtain a Top Secret user ID:

  1. Complete Top Secret Security Request Form and obtain approval of your manager.

  2. Submit form to agency top secret administrator or OIT. The OIT contact information is located on the TSS Request Form.

For user to obtain access to COFRS, Financial Data Warehouse (FDW), and Document Direct (DD):

  1. Complete and sign the Security Request Form for COFRS, FDW, Document Direct and obtain the approval of the department controller. 

  2. Read and sign the Statement of Compliance for Computer Usage and Data Security form.

  3. Submit completed request form and Statement of Compliance to your agency’s security administrator.

For user to obtain access to CPPS and Human Resources Data Warehouse:

  1. Complete and sign the Security Request Form for CPPS, HRDW and EDW and obtain the approval of the department controller.

  2. Read and sign the Statement of Compliance for Computer Usage and Data Security form.

  3. Submit completed request form and Statement of Compliance to your agency’s security administrator.

For user to obtain access to KRONOS:

  1. Complete and sign the KRONOS Security Authorization Form and obtain the approval of the department controller.
  2. Read and sign the Employee Statement of Compliance on the KRONOS Security Authorization Form.
  3. Submit completed form to your agency’s KRONOS Administrator.

 

Policies

Forms

Other Documents