top of page

ISO 27001 Control 5.18: Access Rights

Managing Access Rights: Safeguarding Organisational Information Assets

Access rights management is a cornerstone of organisational security, ensuring that users and systems access only the resources they require for their roles. By adhering to structured policies for provisioning, reviewing, modifying, and revoking access rights, organisations can mitigate risks, maintain compliance, and protect sensitive assets.


Purpose of Access Rights Management

The core objectives of managing access rights include:

  • Defining and authorising access to information and associated assets based on operational and business needs.

  • Ensuring timely provisioning and revocation of access rights.

  • Preventing unauthorised access and misuse of organisational resources.


Key Guidelines for Access Rights Management


1. Securing Authorised Approvals

  • Obtain explicit authorisation from asset or information owners before granting access rights.

  • Involve management in approval processes, particularly for sensitive or privileged access levels.


2. Alignment with Policies and Roles

  • Ensure all access rights comply with the organisation’s access control policies.

  • Integrate principles like segregation of duties to mitigate conflicts of interest or role overlaps.


3. Timely Access Revocation

  • Promptly remove access rights when they are no longer needed, such as when:

    • An individual leaves the organisation.

    • A temporary assignment or contract concludes.


4. Temporary Access Management

  • Provide temporary access rights for specific periods as required, ensuring they are automatically revoked after expiration.


5. Centralised Record Keeping

  • Maintain a comprehensive, centralised record of all granted access rights, linking them to user identifiers.

  • Document changes to access rights, including updates, revocations, and replacements.


Regular Review of Access Rights

Regular reviews are essential to ensure ongoing security and compliance. Organisations should:

  • Reassess access rights after significant role changes, such as promotions or terminations.

  • Review privileged access rights to ensure they remain necessary and justified.

  • Conduct proactive adjustments or revocations based on periodic risk assessments.


Special Considerations During Employment Changes

Before employment changes or terminations, organisations must:

  • Evaluate risks associated with the user’s access, considering whether the termination is voluntary or management-initiated.

  • Review the user’s responsibilities and the sensitivity of assets they can access.

  • Adjust or remove access rights to prevent potential misuse or security breaches.


Streamlined Access Through Roles and Profiles

To simplify access management:

  • Define user roles based on business requirements, bundling common access rights into profiles.

  • Manage access rights at the role or profile level to streamline requests and reviews.

  • Avoid duplicating access rights without thorough consideration, as it can lead to over-privileged accounts.


Incorporating Security in Contracts

  • Include clauses in employment and service contracts to enforce adherence to access control policies.

  • Define clear sanctions for unauthorised access attempts, promoting accountability.


Conclusion

Managing access rights effectively is crucial to protecting organisational resources and minimising security risks. By implementing clear processes for provisioning, reviewing, and revoking access, organisations can ensure secure and appropriate resource usage. Regular reviews, role-based access models, and diligent oversight of access changes enhance overall security and resilience, enabling organisations to meet operational and regulatory demands with confidence.

Comments


image.png

Play Crossy Chicken

Never miss another article.

About the author

Alan Parker is an IT consultant and project manager who specialises in IT governance, process implementation, and project delivery. With over 30 years of experience in the industry, Alan believes that simplifying complex challenges and avoiding pitfalls are key to successful IT management. He has led various IT teams and projects across multiple organisations, continually honing his expertise in ITIL and PRINCE2 methodologies. Alan holds a degree in Information Systems and has been recognised for his ability to deliver reliable and effective IT solutions. He lives in Berkshire, UK, with his family.

bottom of page