How to Make Logging In Safe Without Making It Painful
ISO 27001 Control 8.5 – Secure authentication – is all about how people (and systems) prove who they are before you let them anywhere near your data, applications or admin interfaces.
Done well, secure authentication:
- keeps attackers out
- keeps genuine users in
- and gives you evidence when something looks suspicious
Done badly, it becomes the weak link that undermines every other control.
This guide turns ISO 27001 Control 8.5 into practical steps you can actually implement and defend in an audit.
What ISO 27001 Control 8.5 Really Expects
In plain language, ISO 27001 Control 8.5 – Secure authentication expects you to:
- Choose authentication methods that match the sensitivity of what’s being accessed
- Use multi-factor authentication (MFA) wherever the risk justifies it (which is most places these days)
- Protect the log-on journey so you don’t leak information or help attackers
- Handle passwords properly – in storage, in transit and on screen
- Manage sessions and timeouts so access can’t be misused
- Log and monitor authentication attempts and respond to suspicious behaviour
An auditor will typically ask:
- “Where do you use MFA, and how did you decide that?”
- “How do you protect your log-in pages from brute force and credential stuffing?”
- “Show me how you’d detect and respond to repeated failed log-ons on an admin account.”
Step 1 – Match Authentication Strength to Risk
Start by aligning secure authentication under ISO 27001 Control 8.5 with your information classification and risk appetite.
Ask for each system or service:
- What type of data is behind this log-on?
- Public, internal, confidential, highly confidential, personal data, financial data, etc.
- What could go wrong if an account is compromised?
- Data breach, fraud, service disruption, regulatory breach, reputational damage
- Who is accessing it, and from where?
- Internal staff only, third parties, customers, internet-facing, remote access, shared workstations
Then define authentication levels, for example:
- Low risk
- Username + password with basic complexity and lockout rules
- Medium risk
- Username + password + MFA (e.g. app-based or hardware token)
- High risk
- Strong MFA, device checks, network/location controls, shorter session timeouts
Document this in an Authentication Standard linked to your access control policy, and reference ISO 27001 Control 8.5 in it.
Step 2 – Make Multi-Factor Authentication the Default for Sensitive Access
For most modern environments, secure authentication under ISO 27001 Control 8.5 usually means:
“If it’s important, it has MFA.”
Good practice:
- Use MFA for:
- Privileged and admin accounts
- Remote access (VPN, remote desktop, cloud consoles)
- Cloud services handling personal or customer data
- Critical line-of-business applications
- Choose sensible factors
- Something you know – password or passphrase
- Something you have – authenticator app, hardware token, trusted device
- Something you are – biometrics (fingerprint, facial recognition) where appropriate
- Consider adaptive / risk-based MFA
- Trigger additional factors when:
- Logging in from a new device or unusual location
- Out-of-hours access
- High-risk actions (changing bank details, exporting data, modifying access rights)
- Trigger additional factors when:
Biometrics under Control 8.5
If you use biometrics:
- Treat biometric templates as sensitive – protect and encrypt them carefully
- Have a plan for compromise or failure
- Ability to disable a biometric factor if it’s suspected compromised
- Always provide a secure fallback (e.g. MFA with strong password + token)
Step 3 – Design Secure Log-On Journeys
ISO 27001 Control 8.5 isn’t just about the factors – it’s about how you handle the whole log-on experience.
Key practices:
Minimal disclosure before log-on
- Don’t display system names, versions or internal details on the log-on page
- Use a generic banner such as: “Authorised use only. Unauthorised access may be monitored and reported.”
Don’t help attackers with your error messages
- Avoid messages like:
- “User not found”
- “Incorrect password for username X”
- Use generic responses:
- “The username or password is incorrect.”
Validate all credentials together
- Only validate once all fields are submitted
- Don’t indicate which part (username/password/second factor) failed
Defend against brute force and scripted attacks
- Implement:
- Account lockout or throttling after repeated failed attempts
- CAPTCHAs or similar protections where high volumes of attempts are likely
- IP-based throttling or temporary blocking for obvious attack patterns
These help you show that log-on under ISO 27001 Control 8.5 is not a soft target.
Step 4 – Handle Passwords Correctly
Even if you rely heavily on MFA, passwords still matter.
For secure authentication:
- Never transmit passwords in clear text
- Force HTTPS/TLS for all log-in pages and APIs
- Disable unencrypted protocols or legacy endpoints
- Protect password entry on screen
- Hide input by default to prevent shoulder-surfing
- Allow accessibility options where needed (e.g. “show password” tick box) – but off by default
- Apply sensible password policies
- Encourage length and passphrases over complex but short passwords
- Avoid forcing unnecessarily frequent resets (which tends to make passwords weaker)
- Block known breached passwords where possible
- Store passwords safely
- Use modern hashing algorithms and salts (even if your application relies on a third-party identity provider, ensure they meet your standard)
All of this supports your evidence for ISO 27001 Control 8.5 and ties into wider identity management.
Step 5 – Manage Sessions and Device Use Securely
Authentication isn’t just the moment of log-on – it’s the whole session.
To align with ISO 27001 Control 8.5:
- Session timeouts
- Automatically log users out after a period of inactivity, especially on:
- Shared devices
- Public or unmanaged endpoints
- Use shorter timeouts for high-risk applications or roles
- Automatically log users out after a period of inactivity, especially on:
- Maximum session duration
- Limit how long a session can exist, even if active, for high-risk systems
- Require re-authentication for particularly sensitive actions
- Device and location awareness
- Consider blocking or stepping up authentication from:
- Unknown devices
- Unsafe networks or geographies
- Combine this with MFA for stronger protection
- Consider blocking or stepping up authentication from:
- Single sign-out where possible
- If you’re using single sign-on (SSO), ensure signing out ends all linked sessions, not just one tab
These measures show you’re not only authenticating securely, but maintaining control throughout the session.
Step 6 – Log, Monitor and Respond to Authentication Events
Logging is a big part of ISO 27001 Control 8.5 – it’s how you prove your authentication controls work and that you can spot problems.
You should:
- Log both successful and failed log-ons
- Include user ID, time, source IP/device, and outcome
- Pay particular attention to admin and privileged accounts
- Alert on suspicious patterns, such as:
- Multiple failed log-ons for the same account in a short time
- Multiple failed attempts across many accounts from one IP
- Successful log-in from an unusual country or at an unusual time
- Inform users of their own activity
- Display last successful log-in and last failed attempt on sign-in
- Optionally notify users of new device or location log-ins
- Tie into incident response
- Treat suspected credential compromise as a security incident
- Have clear steps for:
- Forcing password resets
- Invalidating tokens or sessions
- Investigating and containing any associated damage
Regular review of authentication logs and alerts is strong, tangible evidence for ISO 27001 Control 8.5.
Step 7 – Don’t Forget Non-Human Authentication
Secure authentication also applies to:
- Service accounts
- APIs
- Machine-to-machine connections
- Integration users
For these:
- Avoid shared static passwords wherever possible – prefer:
- Mutually authenticated certificates
- Signed tokens with limited lifetimes
- Managed identities where the platform handles secrets
- Restrict what each identity can do (least privilege)
- Rotate credentials regularly and whenever compromise is suspected
- Log and monitor usage of these credentials as carefully as human ones
This closes a common gap where “background” access quietly bypasses good human authentication controls.
Quick Implementation Checklist for ISO 27001 Control 8.5
Use this as a simple “how ready are we?” list:
- You have a documented Authentication Standard linked to information classification and risk.
- Multi-factor authentication is used for privileged accounts, remote access and key business systems.
- Log-on pages do not reveal unnecessary system details and use generic error messages.
- There are controls against brute force and scripted attacks (lockouts, throttling, CAPTCHAs, etc.).
- Passwords are never sent in clear text, and are correctly protected in storage and on screen.
- Session timeouts and maximum session durations are in place, appropriate to the risk.
- Authentication events (success and failure) are logged, monitored and alerted on for suspicious behaviour.
- Users are informed about recent authentication activity (e.g. last log-in / failed attempts).
- Non-human authentication (APIs, service accounts) is also controlled, logged and regularly reviewed.
- There are incident response procedures for suspected credential compromise.
If you can walk through real systems and show these in action, you’ll have strong, practical evidence that ISO 27001 Control 8.5 – secure authentication – is not just written down, but working in day-to-day operations.
Explore the ISO 27001 Controls
