Skip to content
arrow_back
search
Annex A 5.15 verified ISO/IEC 27001:2022

Access Control Policies and Procedures

Set and apply rules for who can access information and systems based on their security needs.

record_voice_over

Plain language

This control is about setting clear rules for who can enter a company’s systems and access its information. It matters because if these rules aren’t in place, unauthorised people could get access to sensitive information, potentially leading to data breaches or misuse of data.

Framework

ISO/IEC 27001:2022

Control effect

Preventative

ISO 27001 domain

Organisational controls

Classifications

N/A

Official last update

24 Oct 2022

Control Stack last updated

19 Mar 2026

Maturity levels

N/A

Official control statement

Rules to control physical and logical access to information and other associated assets shall be established and implemented based on business and information security requirements.
verified ISO/IEC 27001:2022 Annex A 5.15
priority_high

Why it matters

Without defined and implemented access control policies and procedures, logical and physical access may be granted inappropriately, enabling unauthorised access and data breaches.

settings

Operational notes

Regularly review access permissions to align with role changes and prevent privilege creep across the organisation.

Mapping detail

Mapping

Direction

Controls