ISO 27001 Annex : A.9.2 User Access Management


ISO 27001 Annex : A.9.2 User Access Management Its objective is to ensure approved user access and avoid unauthorized access to systems and facilities.
A.9.2.1 User registration and de-registration
Control- In order to allow the assignment of access rights, a systematic process of user registration and de-registration should be enforced.
Implementation guidance- The process to manage user IDs should include:
  1. Use unique user IDs to encourage users to be connected to and hold accountable for their actions; use of shared IDs should only be permitted where they are required for business or operational purposes and should be authorized and documented.
  2. Immediately disable or delete user IDs of people that have left the organization.
  3. Identifying and deleting or disabling redundant user IDs on a periodically
  4. Making sure that other users do not receive redundant UIs.
Other information- The provision or revocation of access to information or information processing facilities is typically a two-step procedure:
1) Assign, allow, or revoke a user identity;
2) Providing or revoking the privilege of access to certain user ID;
In order to keep the organization’s assets safe, we should design certain policies for access controls and prevent unauthorized users from accessing our organization. User Acess management is one of he main access control that should be in place so to keep up with the confidentiality, availability, and integrity. The guidelines for the policy of User Access Management, Unique User IDs, User Authorization, access rights, and limitations of specific user roles are being defined in Annex 9.2. of Standard 27002. At Infosavvy, we do have certain standards to follow to ensure that access check-points are implemented for particular UUID’s and that we apply for one of the most important information security certificates. i.e. IRCA CQI ISO 27001:2013 Lead Auditor (LA) and ISO 27001 Lead Implementer (LI) (TÜV SÜD Certification). Our well-trained and professional trainers will help you by providing you with comprehensive information and several examples to enhance an applicant’s ability to handle User Acess Management, to ensure the right access to the right user.
A.9.2.2 User Access Provisioning
Control- A formal process for granting access to users should be put in place to grant or remove access privileges for all categories of users to all systems and services.
Implementation guidance- The process for granting or revoking access rights granted to user IDs should include:
  • Approval from the Information System Owner or the Service User Authorisation; separate approval by management of the Access Rights may also be advisable;
  • Verify, in line with other criteria such as the segregation of duties, that the level of access given is sufficient for access policies;
  • Ensuring that access privileges (e.g. by service providers) are not enabled prior to the completion of authorization procedures;
  • Maintaining a central database of access privileges given to a user ID for accessing information systems and services;
  • Adapt users’ access rights who have changed their roles or jobs, restrict or block privileged access automatically by users who left the organization;
  • Reviewing access privileges with owners of information systems or facilities periodically
Other Information- The establishment of user access roles based on organizational criteria should be taken into account, which summarizes the number of access privileges in typical user access profiles. Access requests and reviews at the level of these positions are easier to handle than at the level of individual privileges. Consideration should be given to incorporating clauses into contracts for personnel and service that define sanctions if personnel or contractors attempt unauthorized access.
------------------------------------------------------------------------------------------------------------
Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092
Contact us – www.info-savvy.com

Comments

Popular posts from this blog

10 Secrets You Will Never Know About Cyber Security And Its Important

What is Penetration testing ?

Types of Vulnerability Assessment