ISO 27001 controls: What is Annex A:7?
Discover how Annex A:7 in ISO 27001 enhances your organisation’s information security through robust HR...
Today we’re going to talk about the set of ISO 27001 Controls and explore what Annex A:9 is in the context of information security in your organisation.
Annex A:9 of the ISO 27001 Controls is all about access control procedures. This control helps to safeguard and limit access to secure information. This is a crucial criterion if you are looking to achieve ISO 27001 certification.
The objective of Annex A:9.1 is to limit access to information and information processing facilities.
Each organisation implementing ISO 27001 requires a set of policies and procedures to protect information security, restricted to those who actually need access. It is illegal to give access to someone who does not require it. System owners are responsible for ensuring the secure operation of their systems; however, they may delegate the day-to-day management and operation to system managers.
The objective of this Annex A control is to limit access to information and information processing facilities. Giving access to the wrong people could lead to significant legal trouble under The Privacy Act 1988 (Cth). For example, releasing someone’s wages to the public could pose a major risk to your organisation.
This clause requires a control-based policy within the systems, including:
Organisations must have their own static IP or VPN Network where information can be accessed. Employees and management should not access information on public networks. Management is responsible for providing proper guidance and regular training for staff to protect information security.
To ensure authorised user access and prevent unauthorised access to systems and services, user access management must include:
Formal registration and de-registration must be enabled for assigning access rights. Access should be given only as per the requirements and responsibilities of the individual’s role. Authorisation procedures should be part of the access control policy during onboarding or off boarding.
The access control policy must have procedures to revoke or restrict access when there is a threat of information loss. Regular checks for ID and password protection against information security are necessary.
Annex A:9.2.3 focuses on managing higher ‘privileged’ levels of access, such as systems administration permissions. The allocation and use of privileged access rights must be restricted and controlled under strict regulations.
The allocation of secret authentication information must be controlled through a proper management process, including passwords, encryptions, and access to high-risk documents. Identification should be verified for users accessing secret authentication information.
Asset owners must regularly review users’ access rights to identify risks associated with secret information. The access control policy should include regular user checks for information security protection.
The access rights of all employees and external party users to information and information processing facilities must be removed upon termination of their employment, contract, or agreement, or adjusted upon change. Employees should sign a policy agreeing not to access information beyond their control.
To make users accountable for safeguarding their authentication information, Annex A:9.3.1 requires multi-factor verification procedures to be followed under the access control policy.
To prevent unauthorised access to systems and applications, Annex A:9.4.1 requires access to information and application system functions to be restricted in accordance with the access control policy.
Where required by the access control policy, access to systems and applications must be controlled by a secure log-on procedure. Passwords must be kept confidential at all times.
No user should share a password with anyone in the organisation. Password management systems must be interactive and ensure quality passwords. An incident report should be available if a password is lost or shared accidentally.
The use of utility programs that might override system and application controls must be restricted and tightly controlled. Confidential details must not be shared outside the organisation.
Access to program source code must be restricted. No one outside the restricted zone should access the information.
For more guidance and support on achieving ISO 27001 certification and understanding Annex A:9, contact Citation Certification today. We provide comprehensive support and training to help your organisation meet all necessary requirements and achieve compliance with ISO 27001 standards.