Access Control

Updated: 2026-02-17

Plain English Translation

ISO 27001 Annex A.5.15 requires organizations to define and enforce rules for who can access information and assets. This covers both logical access (like logging into software or databases) and physical access (like entering a server room or office). The core principle is that access should not be granted arbitrarily; it must be based on specific business requirements and security needs, typically following the 'need-to-know' principle and 'least privilege' standards.

Executive Takeaway

Access control is the gatekeeper of your data; you must establish strict rules ensuring users only access what they need to do their jobs.

ImpactHigh
ComplexityMedium

Why This Matters

  • Prevents unauthorized data exposure by restricting system entry to approved users only
  • Reduces the blast radius of a security breach by limiting what compromised accounts can access

What “Good” Looks Like

  • A formal Access Control Policy is approved and accessible to all staff
  • Access is granted based on roles (RBAC) and reviewed regularly to revoke unnecessary permissions; tools like WatchDog Security's Compliance Center can help schedule reviews, capture owner attestations, and retain evidence for audits.

It is an organizational control that mandates the establishment of rules to control both physical and logical access to information assets based on business and security requirements.

A.5.15 consolidates the previous detailed controls (like A.9.1.1 Access control policy) into a single, broader requirement to establish and implement access rules based on business needs.

It should include the philosophy of 'need-to-know', rules for user registration/de-registration, management of privileged access rights, password management standards, and review frequencies.

By defining specific roles (RBAC) with the minimum permissions necessary to perform job functions and configuring systems to deny all access by default unless explicitly granted.

Auditors typically request the Access Control Policy, tickets showing approval for new access requests, logs of access reviews, and evidence of access revocation for terminated employees. WatchDog Security's Compliance Center can help centralize these evidence items against A.5.15 and track gaps where reviews or revocations are missing.

A.5.15 requires rules for access; while it doesn't explicitly name MFA, modern risk assessments usually dictate MFA as a necessary rule for remote or privileged access to meet 'security requirements'.

It requires defining IAM policies, using cloud-native roles, and ensuring that access to the cloud console and SaaS applications is restricted based on the established policy.

Logical access control restricts digital entry to systems and data (e.g., usernames/passwords), while physical access control restricts entry to buildings, rooms, and hardware (e.g., badges/keys).

Access rights should be reviewed at 'planned intervals', which typically translates to quarterly reviews for privileged/production access and annual reviews for standard user access.

Service accounts are 'associated assets' and must have restricted access rules, secure authentication (like key rotation), and be included in access reviews just like human users.

Access reviews often break down because ownership is unclear and evidence is scattered across tickets, spreadsheets, and emails, making it hard to prove reviews happened at planned intervals. WatchDog Security's Compliance Center helps by mapping A.5.15 to recurring evidence tasks and storing review outputs, so you can show who reviewed access, when it occurred, and what removals or changes were actioned.

Least privilege is hard to sustain when permissions drift and new services are adopted quickly, leading to over-provisioned roles and orphaned access paths. WatchDog Security's Posture Management helps by identifying misconfigurations and risky access-related settings across cloud environments, giving teams a structured way to detect and remediate access-control weaknesses tied to A.5.15.

ISO-27001 A.5.15

"Rules to control physical and logical access to information and other associated assets shall be established and implemented based on business and information security requirements."

VersionDateAuthorDescription
1.0.02026-02-17WatchDog Security GRC TeamInitial publication