AC-01 Access Control Policies and Procedures

Access Control

Low Moderate High Privacy

Description

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the access control policy and associated access controls.

Supplemental Guidance

The access control policy and procedures are consistent with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. The access control policy can be included as part of the general information security policy for the organization. Access control procedures can be developed for the security program in general, and for a particular information system, when required. NIST Special Publication 800-12 provides guidance on security policies and procedures.

Changes from Rev 4

Title changed from 'Access Control Policy and Procedures' Requires selection (one or more) of organization-level; mission/business process-level; system-level AC policies Adds text requiring consistency with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines Requires the designation of a specific official to manage the development, documentation, and dissemination of the access control policy and procedures Discussion amplifies the need for policy and procedures for risk management, and to help provide security and privacy assurance Addresses access processes and procedures elements of withdrawn App J control IP-02

Enhancements

(0) None.

Compliance Mappings

ISO 27001:2022

A.5.1A.5.15

ISO 27002:2022

5.15.15

COBIT 2019

DSS05

CIS Controls v8

CIS 6

SOC 2 TSC

CC1.2-POF1CC1.4-POF1CC2.2-POF1CC2.2-POF7CC5.3CC5.3-POF1CC5.3-POF6CC6.1CC6.1-POF3CC6.1-POF7CC6.1-POF8CC6.1-POF9CC6.6CC6.6-POF2CC6.6-POF3CC7.2-POF1P1.1-POF5

PCI DSS v4.0.1

12.17.1

CSA CCM v4

DSP-01IAM-01

CSA AICM v1

DSP-01IAM-01

ISO 42001:2023

A.2.2A.2.3A.9.2

NIS2 Directive

Art. 21(2)(i)

MAS TRM

9

BSI IT-Grundschutz

ORP.4

ANSSI

Hygiene.10Hygiene.14Hygiene.2RGS.1.3SecNumCloud.10.1SecNumCloud.6.1

FINMA Circular 2023/1

IV.A(23)IV.A(24)IV.B.d(59)IV.B.d(60)

OSFI B-13

B-13.1.3B-13.3.2

EU GDPR

Art.24(1)Art.24(2)Art.25(1)Art.32(1)(b)Art.32(2)Art.5(1)(f)

EU DORA

Art.5(1)Art.6(1)Art.9(4)(c)

BIO2

5.15.15

RBI CSF

Annex1.8ITGRCA.19ITGRCA.24

FISC Security Guidelines

FISC.T2

LGPD + BCB 4893

BCB.Art.2BCB.Art.3LGPD.Art.46LGPD.Art.50

HKMA TM-E-1

TME1.2.5TME1.8.1

MLPS 2.0

8.1.5.38.1.7.2

DNB Good Practice

DNB.1.2

EU CRA

CRA.I.2d

SAMA CSF

1.23.1

NCA ECC

1-32-2

UAE IA

T3T9

CBB TM

TM-6

Qatar NIA

AC

CBUAE

CR-4

CBE CSF

CTO-1

SA JS2

JS2-7.1

CBN CSF

Part1.3Part3.2

BoG CISD

CISD-VIII

POPIA

s19

BoM CTRM

3.3

IOSCO Cyber Resilience

GOV-1PROT-1

BCBS 239

Principle 11

CPMI-IOSCO PFMI

PFMI.P17PFMI.P2

FFIEC IS

II.C.1II.C.15II.C.7(b)

NYDFS 500

500.3500.7

HIPAA Security Rule

§164.308(a)(3)(i)§164.308(a)(4)(i)§164.310(b)§164.312(a)(1)§164.316(a)

ECB CROE

CROE.2.3.1

EBA ICT Guidelines

3.2.13.3.13.4.13.4.2

SEBI CSCRF

PR.AA

BOT Cyber Resilience

Ch2.2

CMMC 2.0

AC

NERC CIP

CIP-003-9

FERC CIP Orders

Order 888

TIBER-EU

TIBER.CONF

PCI HSM

1

Common Criteria

CC Part 2 — FMT

ISAE 3402

Clause 4

Solvency II

Art.41(1)Art.41(3)DR.258DR.266EIOPA-ICT-4.4

Lloyd's Minimum Standards

MS8.2

NAIC Insurance Data Security

4-access4B

PRA SS1/23

P-IT.1

FCA SYSC 13

SYSC 13.6.5SYSC 13.7.3

HITRUST CSF v11

01.a04.a

FDA 21 CFR Part 11

§11.10(d)

FDA Cybersecurity Guidance

SA-1

ISO 27799

5.19.1

NHS DSPT

NDG-1.1NDG-4.1

MiCA

Art.62(7)

Basel SCO60

SCO60.60

BSSC Standards

GSP-11

SEC Custody (Digital Assets)

SEC-CD-02SEC-CD-05SEC-CD-17SEC-CD-20

ISO 17799 (legacy)

11.1.111.4.115.1.1

COBIT 4.1 (legacy)

DS11.6PC5