Access Control: Ensuring Authorized and Preventing Unauthorized Access in your organisation

Access control is a crucial aspect of information security, aimed at ensuring authorized access and preventing unauthorized access to information and other associated assets. The purpose of access control is to secure information and resources from unauthorized access, tampering, and other malicious activities. In this blog, we will discuss the importance of access control, guidelines for access control policy, and different approaches to implement access control.

Guidance for Access Control Policy

The owners of information and assets should determine the information security and business requirements related to access control. A topic-specific policy on access control should be defined, taking into account these requirements, and communicated to all relevant parties. The policy should consider the following factors:

  • Determining the type of access required by different entities to the information and assets
  • Security of applications
  • Physical access controls, such as appropriate physical entry controls
  • Information dissemination and authorization (e.g., the need-to-know principle) and information security levels and classification of information
  • Restrictions on privileged access
  • Segregation of duties
  • Relevant legislation, regulations, and contractual obligations regarding access to data or services
  • Segregation of access control functions (e.g., access request, authorization, administration)
  • Formal authorization of access requests
  • Management of access rights
  • Logging

Access Control Rules and Implementation

Access control rules should be implemented by defining and mapping appropriate access rights and restrictions to the relevant entities. Roles can be assigned to entity groups to simplify access control management. The following factors should be taken into account when defining and implementing access control rules:

  • Consistency between access rights and information classification
  • Consistency between access rights and physical perimeter security needs and requirements
  • Considering all types of connections in distributed environments to ensure entities have access only to authorized information and assets, including networks and services
  • Reflecting dynamic access control elements

Overarching Principles of Access Control

The following are two of the most frequently used principles in access control:

  • Need-to-know: an entity is only granted access to the information required to perform its tasks
  • Need-to-use: an entity is only assigned access to information technology infrastructure where a clear need is present

Considerations for Specifying Access Control Rules

When specifying access control rules, the following should be considered:

  • Establishing rules based on the principle of least privilege (“everything is generally forbidden unless expressly permitted”) instead of the weaker rule (“everything is generally permitted unless expressly forbidden”)
  • Changes in information labels, initiated automatically or by a user
  • Changes in user permissions, initiated automatically by the information system or by an administrator
  • Regular review of approvals

Supporting Access Control Rules

Access control rules should be supported by documented procedures and defined responsibilities. There are several ways to implement access control, including MAC (Mandatory Access Control), DAC (Discretionary Access Control), RBAC (Role-Based Access Control), and ABAC (Attribute-Based Access Control). Access control rules can be applied in different granularities, ranging from covering entire networks or systems to specific data fields. The cost impact of access control rules depends on their granularity and strength. Business requirements and risk considerations should be used to define the access control rules and granularity required.

In conclusion, access control is a critical component of information security that ensures authorized access and prevents unauthorized access to information and other associated assets. By following the guidelines and principles discussed in this blog, organizations can implement effective access control policies and practices, protecting their information and assets from potential threats.

ERS Consultancy brings you a comprehensive solution for ISO 27001 compliance. Our certified professionals will help you establish an access control system that meets the highest standards in information security. From assessing potential risks to conducting security checks, we’ll ensure your organization is fully aligned with ISO 27001 and protected from cyber threats.

FAQs

Unauthorized access can vary across different contexts. For example, in a digital context, it could be someone obtaining your password and logging into your email account without your permission. In a physical context, it could be someone entering a restricted area in a building using a stolen access card.

Yes, unauthorized access is a significant threat. It can lead to data theft, destruction of sensitive information, or disruption of services. This can have severe consequences for individuals and organizations, including financial loss and damage to reputation.

Illegal access and use refer to instances where an individual or entity gains access to a system, network, or data without the owner’s permission and uses it for illegal activities. This can involve activities such as data theft, identity theft, financial fraud, or distribution of malware.

Yes, unauthorized access to computer systems, networks, and data generally is illegal and can lead to criminal charges. Laws such as the Computer Fraud and Abuse Act in the United States or the Computer Misuse Act in the UK exist to deter and punish such offenses.

Yes, a privacy breach often involves unauthorized access to confidential and personal data. It implies that someone has gained access to data they are not permitted to view, leading to violations of privacy laws and regulations.

Scroll to Top