Access is one of those things that feels simple. Until it isn’t.
Someone needs access to a system. You give it to them. They do their job. Everyone moves on. But over time, access builds up. People change roles. Contractors come and go. Permissions get layered on top of each other. And suddenly, no one is quite sure who can access what, or why.
That’s whereISO 27001: Control 5.18: Access Rights comes in.
At its core, Control 5.18 is about making sure that access to information and systems is granted, reviewed and removed in a controlled way. Not just at the start. Not just when something goes wrong. Continuously.
It requires organisations to:
In plain English: people should only have access to what they need, and nothing more, for as long as they need it.
Most organisations don’t fail this control because they don’t care. They fail because access management is spread across:
…and a lot of “we’ll sort that later”
A few common patterns:
Individually, these seem manageable. Collectively, they create real risk.
Access is the gateway to everything else. If someone has access they shouldn’t have:
And importantly, from an audit perspective, it’s one of the first places auditors look. Because it tells them a lot about how disciplined your environment really is.
A strong approach to access rights is not complicated. But it is consistent.
This is one of those controls where manual processes don’t scale well. Spreadsheets, email approvals and ad hoc reviews might work at a small size, but they quickly become unreliable. What makes the biggest difference is:
Because ultimately, this control is not just about doing the right thing. It’s about being able to prove you’re doing it.
Control 5.18 is not about locking everything down. It’s about moving from reactive access decisions, fragmented processes and unclear ownership to something that is structure, visible and repeatable.
When done well, access management becomes part of business as usual. Not something you scramble to fix before an audit.
Most organisations don’t have a single catastrophic access failure. They have a slow drift into over-permissioned systems and unclear ownership. Control 5.18 exists to stop that drift. Not with complexity. But with consistency.
And like most good controls, it works best when it’s part of a system, not a standalone activity.