ISO 27001 Annex A Control 8.18

ISO 27001 control 8.18 Use of privileged utility programs

The basics

ISO 27001 control A.8.18 Use of privileged utility programs requires companies to control the use of programs that can override or change security configurations, in order to prevent the bypass of security controls.

Documentation

ISO 27001 control A.8.18 Use of privileged utility programs can be documented:

These documents are not mandatory but are recommended.

Implementation

In order to comply with control A.8.18 Use of privileged utility programs you might implement the following:

  • Technology — the technology to enable management of the use of privileged utility programs mainly involves software (e.g., user management systems, logging and monitoring tools, etc.). Companies may use access management features available on their local computers to set users’ access to privileged utility programs, and may use networked systems to allow centralized and remote management of the use of privileged utility programs.
  • Organization/processes — you should set up a process for defining which privileged utility programs can be used, how access to them is provisioned, reviewed, modified, and removed. You can document those processes through Security Procedures for IT Department or a Privileged Access Procedure.
  • People — make employees aware of why managing access to privileged utility programs is needed, and train IT staff on how to manage them.

Audit evidence

During the certification audit, the auditor might look for the following evidence regarding control A.8.18 Use of privileged utility programs: if the use of programs that can override or change security configurations are controlled.