0% found this document useful (0 votes)
125 views6 pages

User Access Management in ISO 27001

This document outlines controls for user access management according to ISO/IEC 27001:2013. It discusses formal processes for user registration and de-registration, provisioning and revoking access rights, managing privileged access, secret authentication information, periodically reviewing user access rights, and removing access rights when users change roles or leave the organization. The goal is to properly assign access based on business needs, disable accounts of departed users, and maintain authorization records.

Uploaded by

jcbr1999
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views6 pages

User Access Management in ISO 27001

This document outlines controls for user access management according to ISO/IEC 27001:2013. It discusses formal processes for user registration and de-registration, provisioning and revoking access rights, managing privileged access, secret authentication information, periodically reviewing user access rights, and removing access rights when users change roles or leave the organization. The goal is to properly assign access based on business needs, disable accounts of departed users, and maintain authorization records.

Uploaded by

jcbr1999
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

ISO/IEC 27001:2013 Information security management systems

-User access management-

Security category – 9.2. User access management

Control – 9.2.1. User registration and de-registration


There has to be a formal user registration and de-registration process to enable
assignment of access rights.

Every user should be formally authorized and registered to each information system,
network or service that it accesses for the business needs.

Management of user IDs:

- use unique user IDs to enable users to be linked to their actions;


- immediately disable or remove user IDs of users who have left the organization;
- periodically identify and remove or disable redundant user IDs and
- ensure that redundant user IDs are not issued to other users.
ISO/IEC 27001:2013 Information security management systems
-User access management-

Control – 9.2.2. User access provisioning


The organization should implement a formal user access provisioning process to
assign or to revoke access rights for all user types to all systems and services.

- the owner of the information system is responsible to approve or revoking of access


rights to user IDs;
- access rights should not be activated before authorization;
- a central record of access rights granted to each user ID should be kept;
- access rights should be adapted for users who change roles or jobs and removed for
users who left the organization.

An easier way to manage access rights is by using role based access - defining user profiles
for different roles and positions in the organization.

Define sanctions for unauthorized access


ISO/IEC 27001:2013 Information security management systems
-User access management-

Control – 9.2.3. Management of privileged access rights


The allocation of privileged access rights should be controlled and there should be
a formal process for this.

Privileges = means to shortcut controls.


Unnecessary allocation and use of privileges may lead to to security breaches.

ISO/IEC 27002 recommendations on the allocation of privileged access rights:


- clear identification of privilege access rights and the users for every application, operating system, database; etc
- allocation of privileged access rights on a need-to-use basis and preferably on an event-by-event basis;
- use an authorization process for granting privileged access rights and not grant them until authorization is
obtained;
- assign the privilege access rights to a user ID that is different from the ones used for regular business activities.
ISO/IEC 27001:2013 Information security management systems
-User access management-

Control – 9.2.4. Management of secret authentication information of users


There should be a formal process for the allocation of secret authentication
information.

Secret authentication is done usually through passwords.

Requirements for allocation of secret authentication information:


- users should be asked to sign a statement to keep personal secret authentication information (passwords)
confidential;
- if the users select their own passwords - they should be provided initially with a temporary password that they
should be forced to change;
- passwords should be given to users in a secure manner and users should acknowledge their receipt.
ISO/IEC 27001:2013 Information security management systems
-User access management-

Control – 9.2.5. Review of users access rights


Asset owners should periodically review user’s access rights.

Access rights have to be based on business needs and when the business need
changes or passes the access should be cancelled.

Periodically access rights should be reviewed and if found that some access
rights are not needed they have to be withdrawn.
ISO/IEC 27001:2013 Information security management systems
-User access management-

Control – 9.2.6. Removal of users of access rights


At the end of employment or contract the access rights of employees or external
parties should be removed. In case of changing positions the access rights should
be adjusted.

If an employment is terminated the access rights associated should be


removed.

If the user is part of a group – and access rights are allocated at group level –
the individuals leaving should be removed from the group and the other
members should be informed to no longer share information with the person
departing.

You might also like