Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Process for granting access rights at the start of employment relationships

Critical
High
Normal
Low

When a person starts an employment relationship, he or she is granted access to all data systems related to his or her role at once.

Connected other frameworks and requirements:
9.2.1: User registration and de-registration
ISO 27001
9.2.2: User access provisioning
ISO 27001
PR.AC-1: Identity and credential management
NIST CSF
5.16: Identity management
ISO 27001

Process for removing hardware and access rights at termination of employment relationship

Critical
High
Normal
Low

Our organization has defined procedures for coordinating, at the time of termination of employment, e.g..:

  • Hardware recovery
  • Removal of access rights
  • Restoration of other information assets
Connected other frameworks and requirements:
8.1.4: Return of assets
ISO 27001
9.2.1: User registration and de-registration
ISO 27001
9.2.6: Removal or adjustment of access rights
ISO 27001
PR.AC-1: Identity and credential management
NIST CSF
5.11: Return of assets
ISO 27001

Avoiding and documenting shared user accounts

Critical
High
Normal
Low

Shared accounts should only be allowed if they are necessary for business or operational reasons and should be separately approved and documented.

If shared accounts are used for admin purposes, passwords must be changed as soon as possible after any user with admin rights leaves their job.

Connected other frameworks and requirements:
32. Security of processing
GDPR
9.2.4: Management of secret authentication information of users
ISO 27001
I07: Tietojenkäsittely-ympäristön toimijoiden tunnistaminen
5.16: Identity management
ISO 27001
4.1 (MIL1): Establish Identities and Manage Authentication
C2M2
No items found.