Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Process for removing hardware and access rights at termination of employment relationship

Critical
High
Normal
Low

Our organization has defined procedures for coordinating, at the time of termination of employment, e.g..:

  • Hardware recovery
  • Removal of access rights
  • Restoration of other information assets
Connected other frameworks and requirements:
8.1.4: Return of assets
ISO 27001
9.2.1: User registration and de-registration
ISO 27001
9.2.6: Removal or adjustment of access rights
ISO 27001
PR.AC-1: Identity and credential management
NIST CSF
5.11: Return of assets
ISO 27001

Screenings and background checks before recruitment

Critical
High
Normal
Low

Applicants applying for cyber security should have their background checked, taking into account relevant laws and regulations.

The check may include:

  • review of recommendations
  • verification of CV accuracy
  • verification of educational qualifications
  • verification of identity from an independent source
  • other more detailed checks (e.g. credit information, review of previous claims or criminal record)

The background check may also be extended to, for example, teleworkers, contractors or other third parties. The depth of the background check can be related to the category of the accessed data.

Connected other frameworks and requirements:
7.1.1: Screening
ISO 27001
T09: Henkilöstön luotettavuuden arviointi
PR.AC-6: Proof of identity
NIST CSF
PR.IP-11: Cybersecurity in human resources
NIST CSF
6.1: Screening
ISO 27001
No items found.