IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition
by Alan Calder, Steve Watkins
CHAPTER 11: ACCESS CONTROL
Access control has become another critical aspect of information security. After all, the most effective way to protect the confidentiality and integrity of information is to limit access to it. That, however, can negatively affect the organization’s operations and there must therefore be an appropriate balance between limiting and providing access. Control 5.15 (Access control) calls for a topic-specific policy that sets out how the organization determines who should have access to what, how information classifications and relevant legislation and other regulatory restrictions are taken into account, and how the various functions involved with providing and managing access should be segregated.
Chapter 1 set out the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access