SPRING DISCOUNT
Get 30% off on toolkits, course exams, and Conformio yearly plans.
Limited-time offer – ends April 25, 2024
Use promo code:
SPRING30

How to handle user access management in an ISO 27001 project through Conformio

Just like your need to implement access control to your sensitive information throughout the company, you also need to control access to the information related to your ISO 27001 project. In such a project, there are several people with different needs, lots of tasks and activities, and many types of information shared. It can easily become a mess, and information that should be kept only by a few people ends up becoming common knowledge, causing the system to be burdened with problems to be dealt with.

In this article, you will learn how Conformio, a Software-as-a-Service for implementation and maintenance of an ISO 27001 Information Security Management System (ISMS), can be used to implement access control and access rights management during the implementation project.

What user profiles would typically participate in an ISO 27001 project?

In an ISO 27001 project, you will normally find these kinds of user profiles:

Managers: people with authority over project results, resource allocation, documentation approval, and conflict resolution. Common organizational roles with this profile are the Chief Executive Officer (when the ISMS scope includes the entire organization), department heads, and the Chief Financial Officer (when this role is the decision maker about financial resource allocation).

Project team: people designated for the coordination and execution of project tasks, elaborating documents, facilitating meetings, and providing training. This can be a team of five, or more persons for bigger or more complex organizations. The organizational roles in this profile will vary depending on the ISMS scope.

Other key employees: people who can affect or be affected by information security activities and who need to be consulted during ISO 27001 implementation. Common roles in this profile are the managers of business units, processes owners, and key users (i.e., people with the most understanding about process execution).

End users: people who need to be aware of the policies, procedures, and controls implemented, so they can perform their activities in a secure manner, as planned.

These general profiles can help define the requirements of access control and access to information.

For more information, see the article RACI matrix for ISO 27001 implementation project.

How to handle user access management in an ISO 27001 project through Conformio - Advisera

What are different ways to add users to Conformio?

Users can be added to Conformio during platform initial setup, or any time later during Conformio usage.

List of people included in ISO 27001 project
Figure 1 – Conformio screen available to add users during initial setup.
User access management in an ISO 27001 project
Figure 2 – Conformio screen available for user management, highlighting new user creation.

How often should user access rights be reviewed?

Good practice recommends that user access review be performed either at regular intervals (the more critical the access right, the smaller the interval between reviews) or when a significant situation occurs (e.g., change in employment situation, change in organization’s hierarchical structure, etc.).

During access rights review, the user’s access must be confirmed or updated according to the new conditions, and special care must be taken with privileged access, i.e., access that can change or bypass security controls – for example, admin users.

User access management through Conformio

In Conformio, users’ access can be given at different levels: access to Conformio’s basic settings (e.g., language, time settings, etc.), access to information security processes’ features (e.g., security objectives setting), and access to folders and documents. Access to Conformio’s settings and information security processes’ features can be given during initial setup, or later during the project through its user management screen by updating Conformio user roles.

For folders, Conformio offers the ability to create private folders and define who has access to them. Further, you can define which level of access each user has, so if you want to preserve the integrity of files, you can approve only the reading rights. Access to folders and documents can be given at any time through the Document explorer screen.

Document management in ISO 27001 project through Conformio
Figure 3 – Configuration of folder’s access rights.

Information security starts with how you treat the data during the project

Access control is one of the main building blocks of information security, and it must be adopted in its earliest stages of implementation, especially when using software solutions, which makes it easier to communicate and share information.

Considering access management features in the software solution you choose to manage your implementation project (like Conformio) brings at least two benefits. First, you take advantage of lesser management effort needed, provided by automation capabilities, to ensure that information is only seen by those who needs to use it. And second, which would be your greatest asset, you start your information security implementation with a strong message to the organization that information security is to be taken seriously.

To see how employees can collaborate on ISO 27001 ISMS implementation steps, documents, and all the necessary tasks, sign up for a 14-day free trial of Conformio, the leading ISO 27001 compliance software.

Advisera Rhand Leal

Rhand Leal

Rhand Leal has more than 15 years of experience in information security, and for six years he continuously maintained а certified Information Security Management System based on ISO 27001. Rhand holds an MBA in Business Management from Fundação Getúlio Vargas. Among his certifications are: ISO 27001 Lead Auditor, ISO 9001 Lead Auditor, Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), and others. He is a member of the ISACA Brasília Chapter.
Read more articles by Rhand Leal