Access control governs the ways in which human and non-human entities are granted access to data, IT resources and applications – and in the case of ISO 27701 6.6, PII and privacy-related material.
Access control is a complex and multi-faceted ICT function that draws in numerous other business functions, such as change management, asset security, topic-specific authorisation, physical security controls and technical concepts such as RBAC, MAC and DAC. As such, ISO 27701 6.6 contains a great deal of supporting guidance from similar privacy and information protection controls contained in the ISO 27002 standard.
Getting access control right is one of the foremost functions of a well-oiled privacy protection operation, particularly within the context of safeguarding PII.
ISO 27701 6.6 contains two sub-clauses that contextualise information provided in ISO 27002 5.15 (Access Control) within the sphere of PII and privacy protection, with numerous supporting clauses provided that deal with various other aspects of information security (see above):
Neither clause contains any PIMS-specific guidance, nor do they bear any relevance to UK GDPR legislation.
Owners of assets containing PII, and the data itself, should develop privacy-based access requirements on both a general and topic-specific basis, and clearly communicate access control policies to all relevant personnel.
General requirements and topic-specific policies should:
ISO classifies an ‘entity’ as a physical, human and/or logical item which has the ability to access data.
Entities should be assigned specific roles, relating to their function and the data they require access to.
When implementing Access Control rules for the various entities it has defined, organisations should:
Access control can often be a complex and tough-to-manage element of an organisation’s ICT operation.
Here are a few general principles to adhere by:
Book a tailored hands-on session
based on your needs and goals
Book your demo
See ISO 27701 Clause 6.6.1.1
ISO 27701 Clause Identifier | ISO 27701 Clause Name | ISO 27002 Control | Associated GDPR Articles |
---|---|---|---|
6.6.1.1 | Access Control Policy | 5.15 – Access Control for ISO 27002 | None |
6.6.1.2 | Access to Networks and Network Services | 5.15 – Access Control for ISO 27002 | None |
How do we help?
ISO 27701 shows you how to build a Privacy Information Management System that complies with most privacy regulations, including the EU’s GDPR, BS 10012 and South Africa’s POPIA.
Our simplified, secure, sustainable software helps you easily follow the approach outlined by the internationally recognised standard.
Our all-in-one-platform ensures your privacy work aligns with and meets the needs of each section of the ISO 27701 standard.
And because it’s regulation agnostic, you can map it onto any regulation you need to.
Find out more by booking a hands on demo.
We can’t think of any company whose service can hold a candle to ISMS.online.