From the course: ISO 27001:2022-Compliant Cybersecurity: The Annex A Controls
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
System and application access control (Controls 8.2–8.5)
From the course: ISO 27001:2022-Compliant Cybersecurity: The Annex A Controls
System and application access control (Controls 8.2–8.5)
- [Instructor] What if everyone in your organization could log into any system with full administrative privileges? As you can imagine, that could quickly lead to a security disaster. ISO 27001 recognizes that poor system and application access controls can lead to serious security incidents or breaches. In this video, we'll look at Controls 8.2 through 8.5, which define good system and application access controls. First, we'll look at Privileged Access Rights, Control 8.2. Here, the requirement is to restrict and manage the allocation and use of privileged access rights. When you think of privileged access, think of accounts that have any type of administrative privileges. The purpose of this control is to ensure that only authorized users, software components, and services have privileged access to systems. Good management of privileged access rights would include identifying any users who need privileged access…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.