ISO_IEC Part 4
ISO_IEC Part 4
2
Contents
1.1 Acceptable use of information and other associated assets (5.16) ..................................... 4
1.2 Practical Application of Clause 5.16: Case Study: ”Tech Solutions” ................................... 6
1.4 Practical Application of Clause 5.17: Case Study: ”Tech Solutions” ................................. 17
1.6 Practical Application of Clause 5.18: Case Study: ”Tech Solutions” ................................. 29
1.8 Practical Application of Clause 5.19: Case Study: ”Tech Solutions” ................................. 44
1.10 Practical Application of Clause 5.20: Case Study: ”Tech Solutions” ............................... 69
3
1. ORGANIZATIONAL CONTROLS
Control 5.16:
The full life cycle of identities should be managed.
Control attributes:
Control type: When it acts : Preventive
Information security properties: Confidentiality, Integrity, Availability
Cybersecurity concepts: Which phase of cybersecurity it supports : Protect
Optional capabilities: Which operational area it belongs to : Identity_and_access_management
Security domains: Which domain it relates to : Protection
Confidentiality Identity_and_ac-
Préventive Integrity Protect Protection
Availability cess_management
Control description:
Identity management, which is about controlling and securing the identities (like user
accounts)
Each person should have their own unique identity (like a username or account) in the
system, so that any actions they take (e.g., accessing files, making changes) can be
traced back to them. This ensures accountability.
Sometimes, multiple people might share one identity (e.g., a generic “Admin” account).
This is only allowed if there’s a valid business or operational reason (e.g., a team needs
a shared account for a specific task). These shared accounts need special approval and
must be documented properly.
Identities assigned to non-human entities (like software, bots, or devices) must be
managed carefully. These identities need separate approval processes and ongoing
monitoring
If an identity is no longer needed (e.g., an employee leaves the company, changes
roles, or a device is decommissioned), it should be disabled or deleted promptly.
4
If an identity is no longer needed (e.g., an employee leaves the company, changes
roles, or a device is decommissioned), it should be disabled or deleted promptly.
Within a specific system or domain, one entity (person, device, etc.) should only have
one identity.
The organization must keep logs of important events related to identities, such as:
o Creating or deleting accounts.
o Changing permissions.
These records help track who did what and when, which is useful for audits or
investigating security incidents.
The goal is to: Make sure every action can be linked to a specific person or entity.
Control evidence:
5
1.2 Practical Application of Clause 5.16: Case Study: ”Tech Solutions”
6
7
8
9
10
11
12
13
1.3 Authentication information (5.17)
Control 5.17:
Allocation and management of authentication information should be controlled by a
management process, including advising personnel on the appropriate handling of
authentication information.
Control attributes:
Control type: When it acts : Preventive
Information security properties: Confidentiality, Integrity, Availability
Cybersecurity concepts: Which phase of cybersecurity it supports : Protect
Optional capabilities: Which operational area it belongs to : Identity_and_access_management
Security domains: Which domain it relates to : Protection
Confidentiality Identity_and_ac-
Préventive Integrity Protect Protection
Availability cess_management
Control description:
How organizations should create, distribute, and manage passwords or PINs securely.
When a new user is set up (e.g., during account creation), any temporary password or
PIN generated automatically should be random and unique for each person.
Users must change this temporary password the first time they log in.
Before giving someone a new password, temporary password, or replacement, the
organization must confirm they are who they claim to be (e.g., through ID checks or
security questions).
Passwords or PINs should be sent to users through secure methods (e.g., encrypted
emails or secure apps), not through regular, unprotected emails.
Users should acknowledge (e.g., via a reply or clicking a confirmation link) that they’ve
received their password.
Systems or software often come with default passwords set by the vendor (e.g., “admin”
or “password”). These must be changed as soon as the system is installed.
The organization should log important actions (e.g., issuing or changing passwords)
and store these records securely, using approved tools like a password vault.
14
Users must not share their personal passwords with anyone.
For shared accounts (e.g., a team account), passwords should only be shared with
authorized people.
If a user suspects their password has been stolen or compromised (e.g., after a
phishing attack), they must change it right away.
Passwords should follow these best practices:
o Don’t use personal info like names, birthdays, or phone numbers (e.g., avoid
“John1985”).
o Avoid dictionary words like “apple” or “house” (or combinations like
“applehouse”).
o Use passphrases (e.g., “SunnyHill2023!”) with letters, numbers, and special
characters.
o Ensure minimum length (usually 12+ characters for better security).
Don’t reuse the same password across multiple services or systems
The system should allow users to pick their own passwords and change them when
needed.
The system must ensure users create strong passwords
When a user logs in for the first time (e.g., with a temporary password), the system
must require them to set a new password.
The system should stop users from reusing passwords they’ve used before.
When users type their password, it should appear as dots or asterisks (e.g., ****)
instead of plain text.
Passwords should be stored and sent using encryption or hashing (approved
cryptographic methods) to protect them.
15
Control evidence:
16
1.4 Practical Application of Clause 5.17: Case Study: ”Tech Solutions”
17
18
19
20
21
22
23
24
25
1.5 Access rights (5.18)
Control 5.18:
Access rights to information and other associated assets should be provisioned, reviewed,
modified and removed in accordance with the organization’s topic-specific policy on and rules
for access control.
Control attributes:
Control type: When it acts : Preventive
Information security properties: Confidentiality, Integrity, Availability
Cybersecurity concepts: Which phase of cybersecurity it supports : Protect
Optional capabilities: Which operational area it belongs to : Identity_and_access_management
Security domains: Which domain it relates to : Protection
Confidentiality Identity_and_ac-
Préventive Integrity Protect Protection
Availability cess_management
Control description:
How to grant or remove access to systems, data, or physical spaces in a secure way.
Before giving someone access to information or assets (like files, databases, or
equipment), you need approval from the person responsible for those assets. (Example:
If someone needs access to a customer database, the database owner must approve
it.)
Access should only be given based on what the person needs to do their job (Example:
A salesperson might need access to customer data but not to financial records)
Ensure that the person approving access is different from the person setting it up
(segregation of duties). (Example: The manager who approves access shouldn’t be the
one configuring the user’s account.)
Take away access rights when someone no longer needs them, especially if they leave
the organization
For temporary workers or short-term tasks, give access only for a specific time period.
26
Make sure the level of access given follows the organization’s access control policies
(Example: An employee shouldn’t have admin-level access if their job only requires
basic user access)
Access should only be turned on (e.g., by IT or a service provider) after all approvals
are complete.
Maintain a central list of who has access to what (e.g., a database)
A spreadsheet or system that lists each user’s ID and what systems they can access.
If someone changes jobs or roles within the organization, adjust their access to match
their new responsibilities.
When access is no longer needed, remove or change it by taking away keys,
passwords, ID cards, or system subscriptions.( Example: If someone’s role changes,
their old password or keycard should be deactivated.)
Keep a record of any changes made to access rights, like when access is granted,
changed, or removed.( Example: Log every time an employee’s access is updated in a
secure system.)
Pay special attention to users with high-level access (like admins who can change
systems). (Example: Check if an IT admin still needs full system access or if it can be
reduced.)
If someone is fired, their access should be revoked immediately to prevent retaliation.
If an employee no longer works on a project, their access to related files should be
removed.
27
Control evidence:
28
1.6 Practical Application of Clause 5.18: Case Study: ”Tech Solutions”
29
30
31
32
33
34
35
36
37
38
39
40
1.7 Information security in supplier relationships (5.19)
Control 5.19:
Processes and procedures should be defined and implemented to manage the information
security risks associated with the use of supplier’s products or services.
Control attributes:
Control type: When it acts : Preventive
Information security properties: Confidentiality, Integrity, Availability
Cybersecurity concepts: Which phase of cybersecurity it supports : Protect
Optional capabilities: Which operational area it belongs to : Supplier_relation-ships_security
Security domains: Which domain it relates to : Governance_and_Ecosystem, Protection
Governance_and_
Confidentiality Supplier_relation-
Préventive Integrity Identity Ecosystem, Protec-
Availability ships_security
tion
Control description:
The organization must create a clear policy on how to work securely with suppliers
This includes setting up processes to identify and manage risks related to the products,
services, or resources (like cloud services) provided by suppliers.
Write a specific policy about how the organization works with suppliers
Share this policy with everyone who needs to know (e.g., employees, suppliers).
The policy should explain how to keep information secure when using supplier products
or services.
List the kinds of suppliers you work with (e.g., IT services, logistics, utilities, banks).
Note which suppliers could impact the confidentiality (keeping info private), integrity
(ensuring info is accurate), or availability (ensuring info is accessible) of your
organization’s information.
Evaluate suppliers
41
Review the security measures suppliers use to protect their own systems and your
information.
Make sure their controls are accurate and complete to maintain the integrity of their
services and your data.
Clearly state which parts of your organization’s information, IT systems, or physical
locations (e.g., offices, data centers) suppliers can access, monitor, or control.
Identify Risky Supplier Components: Pinpoint which supplier-provided IT components or
services could affect your information’s confidentiality, integrity, or availability (e.g.,
software, hardware, or cloud storage).
Look for risks like: Malicious supplier employees accessing your data.
Create plans to reduce these risks.
Monitor Supplier Compliance: Regularly check if suppliers follow your security
requirements.
Handle Non-Compliance: If a supplier doesn’t meet security standards, take action to fix
the issue (e.g., work with them to improve or switch suppliers).
Manage Incidents: Have a plan for handling problems with supplier products or services
(e.g., a software failure or data breach).
Define who (you or the supplier) is responsible for fixing issues.
When stopping work with a supplier, ensure: Their access to your systems is removed.
Plan for Supplier Failure: Have backup plans, like identifying alternative suppliers in
advance, to avoid delays.
42
Control evidence:
43
1.8 Practical Application of Clause 5.19: Case Study: ”Tech Solutions”
44
45
46
47
48
49
50
51
52
53
54
55
56
59
60
61
62
63
64
65
1.9 Addressing information security within supplier agreements (5.20)
Control 5.20:
Relevant information security requirements should be established and agreed with each
supplier based on the type of supplier relationship.
Control attributes:
Control type: When it acts : Preventive
Information security properties: Confidentiality, Integrity, Availability
Cybersecurity concepts: Which phase of cybersecurity it supports : Protect
Optional capabilities: Which operational area it belongs to : Supplier_relation-ships_security
Security domains: Which domain it relates to : Governance_and_Ecosystem, Protection
Governance_and_
Confidentiality Supplier_relation-
Préventive Integrity Identity Ecosystem, Protec-
Availability ships_security
tion
Control description:
Describe what information the supplier will access or receive (e.g., customer data,
financial records).
Specify how this information will be shared or accessed (e.g., via email, cloud platform,
or physical documents)
List all laws, regulations, and contracts the supplier must follow (e.g., data protection
laws like GDPR, intellectual property rules).
Explain how the supplier will comply with these requirements. (Example: If handling
personal data, the supplier must follow privacy laws and prove compliance.)
The supplier must follow your organization’s security policies (Example: Require the
supplier to use strong passwords and report security incidents.)
Define acceptable and unacceptable ways to use the information or assets (Example: A
supplier can’t share your data with others without permission.)
66
Set minimum security standards for the supplier’s IT systems based on the type of
information and access (Example: Require encryption for sensitive data stored on their
servers.)
Include terms for compensation or fixes if the supplier fails to meet security
requirements. (Example: If a breach occurs due to their negligence, they cover the
costs.)
Define how the supplier should handle security incidents (Example: If there’s a data
breach, they must report it immediately and work with you to resolve it.)
Require the supplier to train their staff on your security policies and procedures.
(Example: Train their team on how to spot phishing emails.)
Name a specific person at the supplier’s organization for security-related questions or
issues.
Where legally allowed, require background checks for supplier employees handling your
information (Example: Ensure their staff are vetted before accessing sensitive data.)
Ask for evidence (e.g., certifications, audit reports) that the supplier meets security
standards. (Example: Request a SOC 2 report to verify their security controls.)
Reserve the right to audit the supplier’s processes and controls to ensure compliance.
(Example: Conduct annual checks of their security practices.)
Require the supplier to provide periodic reports on their security controls and fix any
issues quickly. (Example: Submit a quarterly report on firewall performance.)
Define processes for fixing problems (e.g., bugs in their system)
Ensure the supplier backs up your data according to your needs (e.g., frequency,
storage location). (Example: Daily backups stored in a secure, offsite location.)
Require the supplier to notify you of changes (e.g., system updates) and allow you to
reject them if needed. (Example: Inform you before upgrading software that handles
your data.)
Include terms for ending the contract, such as returning assets, securely disposing of
data, and maintaining confidentiality afterward. (Example: Return all customer data and
destroy copies when the contract ends.)
Ensure the supplier securely deletes your information when it’s no longer needed.
(Example: Shred physical documents or wipe digital data permanently.)
67
Control evidence:
68
1.10 Practical Application of Clause 5.20: Case Study: ”Tech Solutions”
69
70
71
72
73
74
75
76