
Access Control: Securing Organisational Assets
Access control under ISO 27001 Control 5.15 is a critical aspect of information security, ensuring that only authorised individuals or systems can access sensitive organisational assets. By establishing and implementing well-defined access control measures based on security and business requirements, organisations can minimise risks and maintain operational integrity.
Table of Contents
Purpose of Access Control
The main objectives of access control are:
- To prevent unauthorised access to sensitive data and critical resources.
- To ensure that authorised users can access the resources they need to perform their roles.
- To support business continuity while maintaining compliance with security and regulatory standards.
Establishing Access Control Rules
Effective access control rules should align with organisational policies and address specific security and business needs.
Key aspects include:
1. Determining Access Requirements
- Identify the entities (users, devices, or services) that need access to specific information or systems.
- Clearly define the type and level of access required for each entity.
2. Implementing Physical and Logical Controls
- Physical Controls: Use secure entry systems, such as keycards, biometric scanners, or PINs, to restrict physical access.
- Logical Controls: Implement multi-factor authentication (MFA), role-based access control (RBAC), and other mechanisms to secure digital resources.
3. Aligning with Information Classification
- Ensure access controls reflect the organisation’s information classification scheme.
- Apply the principles of least privilege and need-to-know to limit access strictly to what is necessary.
4. Segregation of Duties
- Divide responsibilities to ensure no single individual can perform conflicting tasks that could compromise security, such as authorising and executing payments.
Key Considerations for Implementation
1. Compliance with Policies and Regulations
- Ensure access controls meet legal, regulatory, and contractual obligations for data security and privacy.
2. Appropriate Granularity
- Define access controls at levels ranging from entire systems to specific data fields.
- Include dynamic factors such as user location, device type, and network conditions when granting access.
3. Managing Privileged Access
- Restrict and closely monitor privileged accounts that have elevated access to critical systems.
- Periodically review and update access permissions to prevent unauthorised use.
Core Principles of Access Control
Two fundamental principles underpin access control strategies:
- Need-to-Know: Provide access only to the information essential for an individual’s role.
- Need-to-Use: Grant access to systems or tools only when a clear operational need exists.
Additionally, adhere to the principle of least privilege: “Access is denied unless explicitly granted.”
Supporting Procedures
To ensure access controls are effective:
- Develop formal procedures for requesting, granting, and revoking access rights.
- Maintain alignment between access permissions and the organisation’s information classification framework.
- Use dynamic access controls to respond to changing security conditions or roles.
Access Control Models
There are multiple models for implementing access control, including:
- Mandatory Access Control (MAC): Central policies dictate access permissions.
- Discretionary Access Control (DAC): Resource owners define access permissions.
- Role-Based Access Control (RBAC): Permissions are based on a user’s role within the organisation.
- Attribute-Based Access Control (ABAC): Access decisions are determined by attributes, such as job function, location, or device type.
Monitoring and Reviewing Access Control
Regular monitoring and review ensure the continued effectiveness of access controls.
Organisations should:
- Audit access logs to detect and investigate anomalies.
- Verify that access rights remain consistent with user roles and responsibilities.
- Update permissions to reflect changes in information classification or business needs.
Understanding ISO 27001 Access Control Policy
An access control policy is a cornerstone of information security, governing how organisations control access to their physical and digital information assets. These policies are essential for preventing data theft and breaches, protecting against insider threats, and guiding security efforts. ISO 27001 emphasises the importance of access governance within the framework of an organisation’s information security management system (ISMS).
Understanding the key components and purposes of these policies is crucial for ensuring effective implementation and adherence to policy compliance and international standards.
ISO 27001:2022 lays all this out in its control 5.15 “Access Control”. I’ve written about the guidance around this control here.
Definition and Purpose
An access control policy establishes a structured framework to determine who can access specific information and infrastructure. Access control refers to the methods used to restrict access to data and resources, while the policy is a formal document outlining these methods. This policy ensures that authorised users can access required files and services while preventing unauthorised access, thus defining levels of access for different personnel.
An access control policy outlines tasks and responsibilities for handling protected information by identifying roles and job functions.
Key Components of an Access Control Policy
A comprehensive access control policy should:
- Clearly define user roles and specify the corresponding access rights for each role.
- Include authorised groups.
- Implement controls to prevent unauthorised access.
- Conduct privilege audits.
The principle of least privilege, which states that users should have the minimum access necessary to perform their tasks, is a key requirement element.
Additionally, the policy must cover:
- Technical and physical security measures to protect information assets.
- Access control based on an organisation’s Information Classification Policy, which helps determine the appropriate access levels.
- Consideration of government policies and regulations to ensure compliance, aligning with information security objectives.
Importance of an Access Control Policy for ISO 27001 Compliance
| Control | Title | Relationship to Access Control Policy |
|---|---|---|
| A.5.16 | Identity Management | Establishes how identities are created, maintained, and deactivated. Ensures only legitimate users can be granted access. |
| A.5.17 | Authentication Information | Defines how passwords, tokens, MFA, etc. are managed and protected. Supports secure user authentication mechanisms. |
| A.5.18 | Access Rights | Governs provisioning, modification, review, and removal of access. Implements the lifecycle defined by the Access Control Policy. |
| A.5.2 | Information Security Roles and Responsibilities | Defines who owns, approves, and reviews access control activities. |
| A.5.3 | Segregation of Duties | Ensures that no single individual has conflicting or excessive access rights (key principle within access control). |
| A.5.9 | Inventory of Assets | Identifies systems and information requiring access controls. |
| A.5.10 | Acceptable Use of Assets | Reinforces user responsibilities for safeguarding access credentials and systems. |
| A.5.12 | Classification of Information | Helps determine access control strength and necessity based on information sensitivity. |
An access control policy is crucial for protecting sensitive data and ensuring compliance with ISO 27001 standards. These policies delineate who can access which resources and the security measures required to prevent unauthorised access. They ensure that individuals have access only to the information necessary to perform their jobs, while protecting sensitive data.
Communicating access control expectations clearly helps staff understand requirements and enforce compliance.

Preventing Data Breaches
Access control is based on the principle of least privilege, ensuring users have only the access necessary for their roles. An ISO 27001 Access Control Policy reduces risks by preventing unauthorised access to sensitive data. Logging and monitoring access attempts are crucial for detecting unauthorised activities and providing an audit trail. Effective logging mechanisms help in pinpointing the source of unauthorised access incidents.
Compliance with data privacy laws, such as the UK GDPR, is essential for an effective access control policy. Key points include:
- Ensuring compliance helps avoid data breaches, policy violations, and potential heavy fines.
- Regular access reviews confirm that users still need their access.
- Regular reviews help revoke unnecessary permissions.
Legal and Regulatory Obligations
Adhering to access control regulations helps ensure compliance with strict data protection laws, such as the GDPR. Regular updates to the access control policy are essential to adapt to evolving security risks and ensure ongoing compliance.
Adhering to legal and regulatory requirements protects sensitive information and maintains organisational integrity in accordance with applicable laws, thereby preventing data breaches.
Creating an Effective Access Control Policy

An effective access control policy is essential for maintaining the confidentiality of sensitive information. The key steps to create such a policy include identifying assets that require protection, understanding legal obligations, and determining user groups that need access.
Incorporating multi-factor authentication brings about significant changes that significantly enhance security by requiring multiple verification methods for user access.
Identifying Sensitive Information
Sensitive information is defined as information that requires protection. It must be safeguarded from unauthorised access. Identifying sensitive information is important as it helps define standards for protecting this information. These policies protect sensitive information like personal data, financial records, and proprietary business information.
Before accessing confidential information, employees and third-party users should sign confidentiality agreements or non-disclosure agreements.
Determining User Access Levels
User access is typically determined based on their specific roles within the organisation. Role-based access control ensures authorised users have the appropriate access privileges for their job functions, preventing unauthorized access to sensitive information.
Implementing Multi-Factor Authentication
Multi-factor authentication (MFA) uses biometrics, passwords, and security tokens, enhancing security by requiring multiple verification methods for user access.
MFA significantly reduces the risk of unauthorised access and strengthens overall security.
Access Control Methods

The ISO 27001 standard specifies 14 categories of controls, with Annex A.9 covering access control. The primary methods of access control include physical, logical, and remote access controls. Different access control models in IT systems include Mandatory Access Control, Discretionary Access Control, Role-Based Access Control, and Attribute-Based Access Control.
Implementing a layered approach to access control enhances security by combining various control measures.
Physical Access Control
Physical access control is essential for protecting organisational premises and ensuring the security of resources. The goal is to ensure that only authorised individuals can enter the premises. Examples of physical access control measures include:
- Locks
- Gates
- Fences
- Walls
Device locks prevent unauthorised access by locking mobile devices after a defined period and requiring authorisation to unlock.
Logical Access Control
Logical access control limits access to information systems. It is designed to ensure that only authorised users can reach digital resources. Session termination involves automatically terminating user sessions after a specific period of inactivity and inactive sessions to enhance security.
Biometric methods like fingerprint scanning and facial recognition are increasingly used as secure forms of logical access control. Multi-factor authentication combines several forms of verification to enhance security against unauthorised access.
Remote Access Control
Defined secure methods for remote access include VPNs, strong authentication, secure remote desktop protocols, and approved devices. According to NIST, remote access must establish usage restrictions and connection requirements, and require authorisation for new remote connections.
Secure remote access protects sensitive information from unauthorised access by using strong passwords.
Managing Access Control
For effective execution of an access control policy, it is crucial to establish ongoing administrative processes and implement technical safeguards. Continuous monitoring of access controls helps organisations identify vulnerabilities and improve security measures as necessary.
Automated tools that track access and detect anomalies in real-time should be part of the continuous monitoring process.

Logging and Monitoring Access
A one-user, one ID policy enhances tracking of user actions, making it easier to log access attempts. Physical security measures should also include monitoring systems to track access to secured areas, which helps in identifying unauthorised user activities.
Regular Access Reviews
Regular access reviews ensure that user access rights remain relevant and appropriate based on role changes within the organisation. The purpose of regular access reviews is to ensure relevant access and catch changes in roles, preventing unauthorised access.
Effective access control combines technical safeguards and administrative procedures to ensure ongoing compliance, security, and access management.
Revoking Access
Access should be revoked during a role change or when an individual leaves the organisation. When an employee leaves the organisation, their access is swiftly revoked. The process of revoking access should follow an audit trail that includes requesting, approving, and taking action on the revocation.
Revoking access promptly is a best practice, ensuring better security and control over permissions.
ISO 27001 Access Control Policy Template
The ISO 27001 Access Control Policy template offers a structured approach to managing access control within an organisation. The template includes key organisational components and serves as a guide for establishing an access control policy. Using the template helps prepare for audits and ensures compliance with ISO 27001 requirements.
This template provides structure and an overview to assist organisations in creating an effective access control policy.
Customising the Template
The access control policy template should align with the organisation’s unique requirements. Consulting with qualified personnel ensures the template meets specific organisational needs when customising it.
Tailoring the template to fit the specific security requirements and access control principles of the organisation will help in creating a robust and compliant access control policy.
Example Policy
An access control policy outlines the rules and guidelines for managing user access within an organisation’s information systems, essential for protecting sensitive data. The ISO 27001 Access Control Policy Template provides a structured format to help organisations develop their own access control policies while adhering to ISO 27001 standards. An access control policy must ensure compliance with these guidelines.
Customising the provided template involves tailoring user roles, access levels, and security measures to fit specific organisational needs and industry requirements. Best practices for implementing the access control policy include regular access reviews and continuous monitoring to ensure compliance and mitigate potential risks.
Implementing and Maintaining Your Access Control Policy
Ongoing administration and technical safeguards are essential for effectively implementing an access control policy. Secureframe can automate:
- Evidence collection
- Continuous monitoring
- Risk assessments
- Control remediation.
These support ISO 27001 compliance. Documenting the revocation process is essential for compliance and future audits as part of a security program.A remote access policy defines user permissions and security measures tailored for remote connections.
Training and Awareness
Regular training on access control policies ensures employees understand their roles and responsibilities. Training and awareness programs on access control ensure employees are familiar with security protocols and procedures.
Training programs should include real-world scenarios to help employees understand the importance of access control policies.
Continuous Monitoring and Improvement
Regular access reviews ensure that user access rights remain appropriate and aligned with current job responsibilities. Logging and monitoring access attempts help organisations identify potentially unauthorised access activities, enhancing security measures.
Internal audits evaluate compliance with access control policies and recommend improvements based on findings from compliance experts. An internal audit can help ensure that access control measures are effective.
Internal Audits and Compliance Checks
Conducting internal audits at scheduled intervals is mandated by ISO 27001 to ensure compliance and effectiveness of the access control policy. Scheduling internal audits at regular intervals verifies adherence to ISO 27001 requirements.
These audits help identify areas for improvement and ensure that access control policies are effective and compliant with legal and regulatory obligations.
FAQs
What is the main objective of Control 5.15 in ISO 27001?
The goal is to ensure that access to information and systems is restricted to only those who are authorised. This minimises the risk of unauthorised access, data breaches, and system misuse.
What are the key principles behind effective access control?
Access control is built on three main principles:
– Need-to-know: Users access only what’s required for their role.
– Least privilege: Users have the minimum permissions necessary.
– Segregation of duties: Avoids conflicts of interest by splitting critical tasks among different people.
What types of access control methods are commonly used?
Common methods include:
– Role-Based Access Control (RBAC): Permissions based on job roles.
– Attribute-Based Access Control (ABAC): Based on user attributes like location, department.
– Mandatory Access Control (MAC): Centralized control by system owner.
– Discretionary Access Control (DAC): Controlled by the data owner.
How is Control 5.15 different from 5.16 and 5.18?
– 5.15 sets the overall rules and framework for who can access what.
– 5.16 (Identity Management) handles the creation and maintenance of user identities.
– 5.18 (Access Rights) focuses on the assignment, review, and revocation of those access rights.
Together, they form a comprehensive access management strategy.
Conclusion
Access control is essential for protecting organisational assets and ensuring secure operations. By defining clear rules, adopting suitable access control models, and following principles such as least privilege and need-to-know, organisations can minimise risks and maintain a strong security posture. Regular reviews and updates to access control mechanisms will ensure they remain effective and aligned with evolving security and business demands.
