Checklist of ISO/IEC 27001-A.9.4.2 Secure log-on procedures

Introduction:

Information technology (IT) systems are critical components of modern organizations, but their increasing complexity and interconnectedness pose significant security risks. 

Cybersecurity threats such as hacking, malware, and phishing attacks can lead to the loss of sensitive information, financial loss, and reputational damage. 

Therefore, it is essential to implement robust security controls to protect against these threats. 

One such control is the implementation of secure log-on procedures, which are covered under section A.9.4.2 of the ISO 27002 standard.

Sample Checklist:

  • Are logon/user identification and authentication processes secured, e.g., using the control-alt-delete key sequence to trigger a privileged kernel function?
  • Are general warning notices displayed during log-on to dissuade unauthorized access, but not information which may help an unauthorized user identify and access the system/service?
  • How are claimed user identities authenticated during the logon process?
  • Has multi-factor authentication been implemented for critical systems/services/remote connections through VPNs etc.?
  • Is logon information only validated after input is complete?
  • Do invalid passwords trigger delays or lock-outs, log entries, and alerts/alarms?
  • Are successful logons being logged?
  • Are passwords never transmitted over networks or links in cleartext?

Conclusion:

Secure log-on procedures are essential to protect IT systems and data from unauthorized access. 

Organizations must implement robust authentication and access controls to ensure that only authorized personnel can access sensitive information. 

The ISO 27002 standard provides guidelines for implementing secure log-on procedures, including the use of multi-factor authentication, password policies, and logging mechanisms. 

Organizations can use the checklist provided in this article to assess their current log-on procedures and identify areas for improvement. 

See also  Checklist of ISO/IEC 27001-A.13.2.2 Agreements on information transfer

By implementing secure log-on procedures, organizations can improve their cybersecurity posture and protect against the ever-increasing threat of cyber attacks.

Leave a comment

Your email address will not be published. Required fields are marked *