The organization shall define and implement procedures for the assignment of roles and responsibilities related to ICT access management. This includes:
- Assigning responsibility for granting, reviewing, and revoking access rights
Ensuring privileged, administrative, and emergency access is granted only based on documented need, and:
- Using dedicated accounts (not shared or generic)
- Controlled via ad-hoc or time-limited authorization
Where feasible, adopting automated tools for privileged access management