ISO 27001 Annex A.9 - why is access control important

Information security management systems (ISMS) focuses on who in your organisation has access to the correct information at the right time. Without this key component, problems such as unauthorised access to information or data modifications could take place. Annex A.9 is designed to prevent these issues from occurring.

This article provides a detailed explanation of Annex A.9, why it is important, and the objective of each control for your business.

*Update: It's important to highlight that the ISO 27001:2013 standard was updated on 25th October 2022, resulting in the ISO 27001:2022 most recent edition with revised guidelines. For the most current and precise details about the ISO 27001 Annex A Controls, please refer to the updated version.

In this article

What is Annex A.9?

Annex A.9 access control guarantees that only authorised users have access to a service, while unauthorised individuals are barred from using it.

Access control is often referred to by the terms “ access management ”, “ rights management ”, and “ identity management ”. Unauthorised people may get access to information assets and information processing facilities, resulting in information misuse or loss. The access control clause tackles these issues by allowing you to control who has access to these assets.

Information asset protection is critical for all organisations, and Annex A.9 protects against a variety of risks , including unintentional damage or loss of information, overheating, threats, and so on. This requires a defined control policy and processes, as well as the registration, removal, and review of user access rights—includes physical access, network access, control over privileged utilities, and limitation of access to programme source code.

What is access control?

An important aspect of information security is determining who can access and use company information. Access control policies ensure that users are who they claim to be and that they have proper access to organisation data through authentication and authorisation. Physical access to buildings, rooms, and data centers can also be restricted with the use of access control.

Passwords, usernames, PINs, biometrics, and other types of security tokens can all be used to identify a user in an access control system. Multi Factor Authentication (MFA) is a common feature of many access control systems, requiring various forms of identification to authenticate a user.

In the event that a user's credentials and IP address have been validated, the appropriate level of access and allowed actions can then be granted to that user.

Access control can be divided into four categories. When it comes to security and compliance, organisations tend to adopt the method that makes the most sense for their own needs. The four types of access control are as follows: