ISO 27001:2022 - A5.18 - Access Rights
Автор: Consultants Like Us
Загружено: 2025-07-14
Просмотров: 108
Ever wonder if that employee who left six months ago could still log into your systems?
Or why the new marketing intern has access to your finance folders?
This isn't just bad housekeeping—it's a massive security hole.
And it’s exactly what ISO 27001 control A.5.18 – Access Rights is designed to fix.
Getting Access Rights wrong leads to "privilege creep", where users slowly accumulate permissions they don’t need, dramatically increasing your attack surface.
---
📧 Forget messy, informal email requests to IT!
This control demands a *formal, robust, and auditable process* for the ENTIRE lifecycle of a user's access.
In this video, we'll show you how to build a **fortress**, not a free-for-all.
🎬 *IN THIS VIDEO, YOU WILL LEARN:*
🔍 *What A.5.18 Is Really About*
We’ll break down the control’s purpose: formal provisioning, review, modification, and removal of access rights.
👻 *The Ghosts in Your Machine*
Discover why privilege creep and orphan accounts can be a CISO’s worst nightmare—and how they can lead to data breaches.
🏛️ *The 4 Pillars of Access Control Mastery*
Your practical, step-by-step guide:
1. Granting (Provisioning):
Build a formal, authorized access request process. No more “just give them the same as Bob” shortcuts.
2. Reviewing:
How to run periodic access reviews that auditors will love—and that actually tighten security.
3. Modifying:
Manage role changes and promotions properly so old permissions don’t linger.
4. Revoking (De-provisioning)
The vital connection between HR's leaver process and IT's timely removal of ALL access.
🗂️ Audit-Proof Evidence
We’ll show you exactly what auditors expect: signed request forms, approval logs, access reviews, and leaver checklists.
💡 This isn’t just about ticking a box for a certificate.
It’s about implementing "Least Privilege" — ensuring only the right people have access to the right information at the *right time*.
👇 *Let’s talk!*
What’s the scariest “old account” or unnecessary permission you’ve ever discovered?
*Share your story in the COMMENTS below!*
---
👍 If this video helps you lock down your access controls,
*HIT that LIKE button* and *SUBSCRIBE* for more practical ISO 27001 content that makes a real difference.
---
🔐 *#ISO27001 #AccessControl #CyberSecurity #InformationSecurity #Compliance #IAM #LeastPrivilege #A518*
---
💼 *Need expert help building or maintaining your ISMS?*
From policy creation to audit success, we’re your partner in transforming compliance from a burden into a business advantage.
Let’s build security that works for YOU!
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: