Access Rights

Updated: 2026-02-17

Plain English Translation

ISO 27001 Annex A.5.18 governs the entire lifecycle of user access permissions—from the moment an employee joins (provisioning), to when they change roles (modification), to when they leave (removal). It also requires regular checks (reviews) to ensure that people still need the access they currently have. The goal is to prevent 'privilege creep,' where users accumulate unnecessary access over time, and to ensure immediate revocation of rights when employment ends.

Executive Takeaway

Access rights must be managed through a formal lifecycle (Joiner, Mover, Leaver) with periodic reviews to prevent unauthorized access accumulation.

ImpactHigh
ComplexityMedium

Why This Matters

  • Prevents data leakage by ensuring only active, authorized personnel can access sensitive systems
  • Reduces legal liability by ensuring immediate access revocation for terminated employees

What “Good” Looks Like

  • Automated provisioning and de-provisioning linked to HR systems
  • Quarterly User Access Reviews (UAR) documented for all critical systems (tools like WatchDog Security's Compliance Center can help track review cadence, collect evidence, and highlight missing UAR records before audits).

It is an organizational control requiring the formal management of the access rights lifecycle—provisioning, reviewing, modifying, and removing permissions—in accordance with access control policies.

The control requires organizations to provision access based on authorization, review access rights at planned intervals, modify rights when roles change, and remove rights immediately upon termination.

Implement a formal Joiner, Mover, Leaver (JML) process that uses role-based access control (RBAC) and enforces periodic reviews to validate continued access needs.

Access rights should be reviewed at planned intervals; typically, privileged/administrative access is reviewed quarterly, while standard user access is reviewed semi-annually or annually.

Control A.5.18 in the 2022 version consolidates several 2013 controls (A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.5, A.9.2.6) into a single, lifecycle-focused control for managing access rights.

Access must be revoked immediately upon termination or contract end, verified via an employee termination checklist and cross-referenced with the asset inventory.

Auditors look for completed access review logs (showing decisions to retain/revoke), tickets for access grants/revocations, and termination checklists for recent leavers. WatchDog Security's Compliance Center can help keep these artifacts mapped to A.5.18, track completion status, and provide a consistent evidence trail for each review cycle.

Least privilege means granting users only the minimum access rights necessary to perform their job functions, preventing unrestricted access to sensitive information.

Privileged access rights pose higher risk and therefore require stricter controls, approval workflows, and more frequent reviews (e.g., quarterly) compared to standard users.

A user access review is a periodic audit where asset owners confirm or revoke current user permissions, directly satisfying the 'reviewed' requirement of A.5.18.

UARs often break down because evidence is scattered across tickets, spreadsheets, and system exports, making it hard to prove reviews were completed and acted on. WatchDog Security's Compliance Center helps by tracking A.5.18 review requirements, centralizing UAR evidence artifacts, and flagging missing review records so access decisions (retain/revoke) are auditable and repeatable.

Privilege creep happens when access is only added during role changes and not consistently removed, leaving users with accumulated permissions over time. WatchDog Security's Risk Register helps teams record access-rights risks (e.g., excessive privileges in critical systems), assign owners and treatment actions (like RBAC cleanup and tighter approvals), and track remediation progress until access rights are right-sized.

ISO-27001 A.5.18

"Access rights to information and other associated assets shall be provisioned, reviewed, modified and removed in accordance with the organization's topic-specific policy on and rules for access control."

VersionDateAuthorDescription
1.0.02026-02-17WatchDog Security GRC TeamInitial publication