Find Out ISO/IEC 27002 Requirements Specific to Privileged Access
ISO 27002 standard has been made consistent on privacy, information security and cryptography with the Organization for Economic Co-operation and Development guidelines. ISO 27002 Code of Practice is a framework providing international best practices in information security controls and systems interoperability implemented in a variety of legal and cultural environments. ISO 27002 standard has been designed as a guidance manual for organizations implementing international best practices in information security controls. Among the listed practices, clauses around privileged access as highlighted below.
Requirement 9.2.3
The allocation and use of privileged access rights should be restricted and controlled
Requirement 9.2.5
Asset owners should review users’ access rights at regular intervals
Requirement 9.4.1
Access to information and application system functions should be restricted in accordance with the access control policy
Requirement 9.4.2
Where required by the access control policy, access to systems and applications should be controlled by a secure log-on procedure.
Requirement 9.4.3
Password management systems should be interactive and should ensure quality passwords
Explore How Sectona Helps You Achieve Compliance with ISO 27002
Sectona privileged access management, an integrated solution with several components like privileged access, remote session collaboration, threat analytics, and session recording follows best practices in information security controls w.r.t. privileged access as intended by the ISO 27002 framework. Here are few use-cases in line with the ISO 27002:
"Well rounded & integrated PAM suite with easy adaptability to support critical user access across AWS resources"
Trusted by



Next Steps
Explore use-cases aligned with your privileged access requirements