Sectona at Infosecurity Europe 2025 | June 3–5 | ExCeL London
Stop by our booth (Stand C 95) for live demo of Sectona’s Modern Infrastructure Access Platform
ISO/IEC 27001 is an international standard, established to outline cybersecurity framework for Information Security Management System (ISMS).
ISO 27001 is designed to establish a structured approach for managing and securing sensitive information. As cyber threats and regulatory demands grew, organizations needed a clear framework to protect data, minimize risks, and ensure business continuity. The standard helps implement an Information Security Management System (ISMS) to safeguard data’s confidentiality, integrity, and availability while fostering trust with stakeholders and customers.
This document provides an overview of the ISO/IEC 27001:2022 standard’s scope, applicability, and timelines to comply. In addition, this serves as a guide for IT professionals and cybersecurity implementors to align the standard’s requirements with the features of the Sectona Security Platform to achieve privileged access and endpoint protection compliance.
The ISO/IEC 27001 standard helps organisations implement information security management systems and apply a risk management process that is adapted to their size and needs, and is scalable as necessary as these factors evolve.
The framework is applicable to companies across:
ISO 27001 consists of two main parts – 11 clauses that define the ISMS requirements and 93 controls detailed in Annex A.
Clauses
Each clause provides clear guidelines for ensuring that information security risks are addressed, and that the organisation maintains compliance with information security management practices.
Clauses 0-3 – Not mandatory
Clauses 4-10 – Mandatory
Clause 4 – Context of the organisation
Clause 5 – Leadership
Clause 6 – Planning
Clause 7 – Support
Clause 8 – Operation
Clause 9 – Performance evaluation
Clause 10 – Improvement
Controls
Controls are designed to address potential risks and ensure that the organisation complies with its information security objectives.
The shift from ISO 27001:2013 to ISO/IEC 27001:2022 commenced on October 31, 2022, and will run through October 31, 2025. After this transition period ends, certifications issued under ISO 27001:2013 will no longer be valid. Organizations holding ISO 27001:2013 certification have three years to make the required adjustments and achieve certification under the updated ISO/IEC 27001:2022 standard.
The following use cases demonstrate how Sectona aligns with the standard.
5.9
Inventory of information and other associated assets
Control Description
An inventory of information and other associated assets, including owners, should be developed, and maintained.
How Can Sectona Help?
Sectona Security Platform enables administrators to gain a complete and network-wide view of all assets controlled by the Privileged Access Management (PAM) system. This allows for better asset tracking, compliance, and resource allocation, while ensuring that sensitive information is consistently monitored and protected.
5.18
Access rights
Control Description
Access rights to information and other associated assets should be provisioned, reviewed, modified, and removed in accordance with the organization’s topic-specific policy and rules for access control.
How Can Sectona Help?
With the Sectona Security Platform, access rights are carefully managed and monitored through the Privileged Access Governance (PAG) module. This functionality enables administrators to review, modify, or revoke access rights for users based on their roles and responsibilities, ensuring that only authorized personnel can access critical systems and data.
8.1
User endpoint devices
Control Description
Information stored on, processed by, or accessible via user endpoint devices shall be protected.
How Can Sectona Help?
Sectona Security Platform partially manages this through EPM (Endpoint Privilege Management). EPM protects endpoints by controlling applications, preventing unauthorised applications from gaining elevation and blocking the execution of blacklisted apps.
8.2
Privileged access rights
Control Description
The allocation and use of privileged access rights shall be restricted and managed.
How Can Sectona Help?
Sectona Security Platform enables secure and reliable Remote Desktop Protocol (RDP) and Secure Shell (SSH) access without requiring additional plugins or agent software. It offers password rotation, blocks external access attempts, and provides need-based elevation with Just-in-Time (JIT) policies. Thick clients are accessible via jump server integration through the browser.
8.3
Information access restriction
Control Description
Access to information and other associated assets shall be restricted in accordance with the established topic-specific policy on access control.
How Can Sectona Help?
Sectona Security Platform restricts direct access to target servers and devices, generating logs of data transfers to trace any discrepancies in information and access.
8.5
Secure authentication
Control Description
Secure authentication technologies and procedures shall be implemented based on information access restrictions and the topic-specific policy on access control.
How Can Sectona Help?
Integrating Multi-Factor Authentication (MFA), Security Assertion Markup Language (SAML), and Single Sign-On (SSO) in Sectona’s Privileged Access Management (PAM) enables a seamless password-less experience for users.
SAML SSO transfers the user’s identity from one provider to another, allowing Sectona to integrate with OneLogin, Okta, and Duo SAML authentication for secure access.
8.6
Capacity management
Control Description
The use of resources shall be monitored and adjusted in line with current and expected capacity requirements.
How Can Sectona Help?
Sectona’s inventory management provides administrators with a network-wide view of assets controlled by the PAM system. Its password management features automated password rotation with unique salt and hash. The password vault is powered by a secure, tamper-proof Oracle MySQL database.
8.7
Protection against malware
Control Description
Protection against malware shall be implemented and supported by appropriate user awareness.
How Can Sectona Help?
Sectona EPM protects against malware by enforcing least privilege on endpoints and removing local admin credentials, significantly reducing the attack surface.
8.11
Data masking
Control Description
Data masking shall be used in accordance with the organisation’s and other related topic-specific policies on access control, and business requirements, while taking applicable legislation into consideration.
How Can Sectona Help?
Sectona EPM protects against malware by offering metadata masking for privileged access, such as SSH commands or DB queries executed through Sectona’s built-in query editor.
8.15
Logging
Control Description
Logs that record activities, exceptions, faults and other relevant events shall be produced, stored, protected, and analysed.
How Can Sectona Help?
Sectona Security Platform logs privileged access and highlights risks based on Sectona’s risk scoring parameters.
8.16
Monitoring activities
Control Description
Networks, systems, and applications shall be monitored for anomalous behaviour and appropriate actions shall be taken to evaluate potential information security incidents.
How Can Sectona Help?
SSP Sectona Security Platform logs privileged access activities and assesses risk using Sectona’s risk scoring. It records sessions, captures metadata, and allows admins to terminate suspicious sessions.
8.18
Use of privileged utility programs
Control Description
The use of utility programs that can be capable of overriding system and application controls shall be restricted and tightly controlled.
How Can Sectona Help?
Sectona EPM elevates specific applications on a need-basis by default, restricts elevation for all other applications, and rotates passwords for built-in admin accounts.
An inventory of information and other associated assets, including owners, should be developed, and maintained.
Sectona Security Platform enables administrators to gain a complete and network-wide view of all assets controlled by the Privileged Access Management (PAM) system. This allows for better asset tracking, compliance, and resource allocation, while ensuring that sensitive information is consistently monitored and protected.
Access rights to information and other associated assets should be provisioned, reviewed, modified, and removed in accordance with the organization’s topic-specific policy and rules for access control.
With the Sectona Security Platform, access rights are carefully managed and monitored through the Privileged Access Governance (PAG) module. This functionality enables administrators to review, modify, or revoke access rights for users based on their roles and responsibilities, ensuring that only authorized personnel can access critical systems and data.
Information stored on, processed by, or
accessible via user endpoint devices shall be protected.
Sectona Security Platform partially manages this through EPM (Endpoint Privilege Management). EPM protects endpoints by controlling applications, preventing unauthorised applications from gaining elevation and blocking the execution of blacklisted apps.
The allocation and use of privileged access rights shall be restricted and managed.
Sectona Security Platform enables secure and reliable Remote Desktop Protocol (RDP) and Secure Shell (SSH) access without requiring additional plugins or agent software. It offers password rotation, blocks external access attempts, and provides need-based elevation with Just-in-Time (JIT) policies. Thick clients are accessible via jump server integration through the browser.
Access to information and other associated assets shall be restricted in accordance with the established topic-specific policy on access control.
Sectona Security Platform restricts direct access to target servers and devices, generating logs of data transfers to trace any discrepancies in information and access.
Secure authentication technologies and procedures shall be implemented based on information access restrictions and the topic-specific policy on access control.
Integrating Multi-Factor Authentication (MFA), Security Assertion Markup Language (SAML), and Single Sign-On (SSO) in Sectona’s Privileged Access Management (PAM) enables a seamless password-less experience for users.
SAML SSO transfers the user’s identity from one provider to another, allowing Sectona to integrate with OneLogin, Okta, and Duo SAML authentication for secure access.
The use of resources shall be monitored and adjusted in line with current and expected capacity requirements.
Sectona’s inventory management provides administrators with a network-wide view of assets controlled by the PAM system. Its password management features automated password rotation with unique salt and hash. The password vault is powered by a secure, tamper-proof Oracle MySQL database.
Protection against malware shall be implemented and supported by appropriate user awareness.
Sectona EPM protects against malware by enforcing least privilege on endpoints and removing local admin credentials, significantly reducing the attack surface.
Data masking shall be used in accordance with the organisation’s and other related topic-specific policies on access control, and business requirements, while taking applicable legislation into consideration.
Sectona EPM protects against malware by offering metadata masking for privileged access, such as SSH commands or DB queries executed through Sectona’s built-in query editor.
Logs that record activities, exceptions, faults and other relevant events shall be produced, stored, protected, and analysed.
SSP Sectona Security Platform logs privileged access and highlights risks based on Sectona’s risk scoring parameters.
Networks, systems, and applications shall be monitored for anomalous behaviour and appropriate actions shall be taken to evaluate potential information security incidents.
SSP Sectona Security Platform logs privileged access activities and assesses risk using Sectona’s risk scoring. It records sessions, captures metadata, and allows admins to terminate suspicious sessions.
The use of utility programs that can be capable of overriding system and application controls shall be restricted and tightly controlled.
Sectona EPM elevates specific applications on a need-basis by default, restricts elevation for all other applications, and rotates passwords for built-in admin accounts.
Sectona provides a platform that is easy to deploy, use, and maintain. Updates take minimal downtime, do not require identity-specialist skills, and keep your business running without interruptions.
Faster go to market times for customers
More scalable than traditional solutions
Solutions by Industry
Products
Resources
Customer Resources
Technical Support
Solutions by Industry
Products
Resources
Customer Resources
Technical Support
Solutions by
Industry
Products
Resources
Customer Resources
Technical Support