User Access Management governs the methods through with users access PII and privacy-related information, and how organisations are able to control such access using a variety of physical and logical measures.
ISO 27701 6.6.2 is a relatively large clause (given the subject matter), that contains six sub-clauses relating to the provision, use and management of user access rights.
Each sub-clause contains information from an adjoining sub-clause in ISO 27002, with guidance adapted to privacy protection and PII, rather than generalised information security:
Two clauses contain guidance that has the potential to impact UK GDPR adherence, and the relevant articles have been provided for your convenience.
Throughout all of its clauses, ISO 27701 6.6.2 contains no further guidance from ISO on the use of a PIMS.
Please note that GDPR citations are for indicative purposes only. Organisations should scrutinise the legislation and make their own judgement on what parts of the law applies to them.
User registration is governed by the use of assigned ‘identities’. Identities provide organisations with a framework to govern user access to PII and privacy-related assets and material, within the confines of a network.
Organisation needs to follow six main guidance points, in order to ensure that identities are managed correctly, and PII is protected wherever it is stored, processed or accessed:
Organisations who work in partnership with external organisations (particularly cloud-based platforms) should understand the inherent risks associated with such practices, and take steps to ensure that PII is not adversely affected in the process (see ISO 27002 controls 5.19 and 5.17).
‘Access rights’ govern how access to PII and privacy-related information is both granted and revoked, using the same set of guiding principles.
Access procedures should include:
Organisations should conduct periodical reviews of access rights across the network, including:
Personnel who are either leaving the organisation (either wilfully or as a terminated employee), and those who are the subject of a change request, should have their access rights amended based upon robust risk management procedures, including:
Employment contracts and contractor/service contracts should include an explanation of what happens following any attempts at unauthorised access (see ISO 27002 controls 5.20, 6.2, 6.4, 6.6).
Book a tailored hands-on session
based on your needs and goals
Book your demo
Privileged access rights provide organisations the ability to simultaneously control access to PII and privacy-related applications and assets, and maintain the integrity of PII across their network.
Unauthorised utilisation of system administrator privileges (or elevated RBAC permissions), is one of the major causes of ICT disruption across the globe.
When managing privileged access rights with privacy protection in mind, organisations should:
Authentication details should be distributed and managed so that:
Any personnel who uses organisational authentication information should ensure that:
Organisations should consider implementing a password management system (specialised password control applications) that:
To safeguard PII and improve organisational privacy protection efforts, passwords should follow four guiding principles:
Organisations should also consider the use of authentication protocols such as Single Sign-On (SSO) to improve password security, but such measures should only be considered alongside the organisations unique technical and operational requirements.
See above (ISO 27701 Clause 6.6.2.2).
See above (ISO 27701 Clause 6.6.2.2).
ISO 27701 Clause Identifier | ISO 27701 Clause Name | ISO 27002 Control | Associated GDPR Articles |
---|---|---|---|
6.6.2.1 | User Registration and De-registeration | 5.16 – Identity Management for ISO 27002 | Article (5) |
6.6.2.2 | User Access Provisioning | 5.18 – Access Rights for ISO 27002 | Article (5) |
6.6.2.3 | Management of Privileged Access Rights | 8.2 – Privileged Access Rights for ISO 27002 | None |
6.6.2.4 | Management of Secret Authentication Information of Users | 5.17 – Authentication Information for ISO 27002 | None |
6.6.2.5 | Review of User Access Rights | 5.18 – Access Rights for ISO 27002 | None |
6.6.2.6 | Removal or Adjustment of Access Rights | 5.18 – Access Rights for ISO 27002 | None |
By adding a PIMS to your ISMS on the ISMS.online platform, your security posture remains all-in-one-place and you’ll avoid duplication where the standards overlap.
With your PIMS instantly accessible to interested parties, it’s never been easier to monitor, report and audit against both ISO 27002 and ISO 27701 at the click of a button.
Find out more by booking a hands on demo.
Book a tailored hands-on session
based on your needs and goals
Book your demo
We can’t think of any company whose service can hold a candle to ISMS.online.