By John Watt on Saturday, 09 October 2021
Category: ISO27001 Information Security Management Systems

ISO27001 and the Annex clauses – Clause A9 Access Control

It's probably fair to say that when people think about information security and ISO27001 they rightly think about passwords, access control and who can see what information. Your Information Security Management System (ISMS) is clearly more than that, but it is a very important part and you do need to spend a large part of your time getting the requirements of this section correct, and it is more than just clever passwords.  

A9.1 Business requirements of access control

This section of Annex 9 of your ISO27001 system is about limiting the access to both information in your organisation and information processing facilities. In other words, you have to think about both who should get access to what information but also who should get access to the area and the technology that the information is processed on. That means you need to develop two things, an access control policy (A9.1.1) and rules around access to networks and network services (A9.1.2).

A9.2 User access management

This is the area that most people think about when we talk about information security so it's probably the area that people believe is the most well understood, in reality, it's may be understood but it's not well done and there are a few things to think about.

 A9.3 User responsibilities

Within your ISO27001 information security management system it's not all one sided, the user has some responsibility as well which is what the clause A9.3.1 is about.

A9.4 System and Application Control

This section is about controlling unauthorised access to both your systems and your applications. Which is probably the bit that most people are familiar with.

Summary

There is a lot to unpack in ISO27001 Annex clause A9 for user access management, it all starts with a good access control policy which is going to set the tone but it does need you to work closely with the experts in your IT side of things to make sure you have things in place correctly and that you don't document processes that either can't be followed by the users of the ISMS or aren't possible within your systems.

Leave Comments