How to Implement ISO 27001 Annex A 5.17

Implementing ISO 27001 Annex A 5.17 is a critical security imperative that mandates a formalised authentication lifecycle to prevent unauthorised access. By enforcing technical verification of secrets and robust hashing, organizations achieve the primary business benefit of reduced credential-based breaches and sustained regulatory compliance.

ISO 27001 Annex A 5.17 Authentication Information Implementation Checklist

Use this implementation checklist to achieve compliance with ISO 27001 Annex A 5.17. This guide focuses on the manual hardening and technical verification of authentication secrets to ensure security is embedded at the system level rather than a superficial dashboard.

1. Establish the Authentication Lifecycle Policy

Control Requirement: A formalised process must exist for the creation, distribution, storage, and revocation of authentication information.

Required Implementation Step: Draft a technical standard that defines password complexity, MFA requirements, and the prohibition of shared accounts. Document the specific technical mechanisms (e.g., bcrypt, Argon2) used for hashing across all local and cloud databases.

Minimum Requirement: A signed policy document and a technical configuration standard mapped to every production system.

2. Secure Initial Distribution of Credentials

Control Requirement: Authentication information must be distributed securely to the intended recipient upon account creation.

Required Implementation Step: Disable the practice of sending initial passwords via email or Slack. Implement a “one-time secret” link or a physical handover process where the user is forced to rotate the credential upon first login before access to the production environment is granted.

Minimum Requirement: Evidence of a forced password change on first-time login for the last 10 onboarded users.

3. Verify Cryptographic Storage of Secrets

Control Requirement: Authentication information must be protected against unauthorised disclosure or modification during storage.

Required Implementation Step: Inspect the database schema for all bespoke applications. Verify that no passwords are stored in cleartext or reversible encryption; ensure they are salted and hashed using modern, industry-standard algorithms within the configuration files.

Minimum Requirement: A database export or screenshot demonstrating that the “password” column contains only non-reversible hashes.

4. Implement Hardened Multi-Factor Authentication (MFA)

Control Requirement: Systems must support and enforce multi-factor authentication for sensitive access.

Required Implementation Step: Manually configure MFA at the identity provider (IdP) or server level (e.g., PAM modules on Linux). Ensure that MFA is “always-on” for administrative interfaces and that “remember me” durations are restricted to a maximum of 12 hours.

Minimum Requirement: Configuration logs showing MFA enforcement for 100% of privileged administrator accounts.

5. Prohibit the Use of Default Credentials

Control Requirement: Default vendor-supplied authentication information must be changed or disabled upon installation.

Required Implementation Step: Conduct a manual audit of all network hardware, IoT devices, and software instances. Change “admin/admin” or “root/password” combinations immediately and document the change in the system hardening log.

Minimum Requirement: A hardening report confirming that default credentials have been rotated on all firewall and switch interfaces.

6. Enforce Account Lockout and Brute-Force Protection

Control Requirement: Measures must be in place to prevent automated guessing or brute-force attacks on authentication info.

Required Implementation Step: Configure account lockout thresholds (e.g., 5 failed attempts) and progressive delays (throttling) within the application code or web server configuration (e.g., fail2ban). Ensure these logs are sent to a central log aggregator for alerting.

Minimum Requirement: A successful test result showing an account being locked out after the maximum allowed failed attempts.

7. Secure Management of Privileged Service Accounts

Control Requirement: Non-human authentication info (API keys, service accounts) must be managed with equal or greater rigour.

Required Implementation Step: Move service account secrets out of environment variables and plaintext config files. Inject them at runtime using a dedicated secret manager (like HashiCorp Vault) and implement a 90-day rotation schedule for all API keys.

Minimum Requirement: A screenshot of the secret management vault showing active rotation policies for all production API keys.

8. Regular Review and Revocation of Credentials

Control Requirement: Authentication information must be revoked immediately upon termination or change of role.

Required Implementation Step: Synchronise the HR leavers list with the Active Directory or IdP. Manually audit local “shadow” accounts on legacy servers that are not integrated into the central SSO to ensure no former employees retain access.

Minimum Requirement: A reconciled report showing that all accounts for employees who left in the last 30 days are “Disabled”.

9. Educate Users on Secret Handling

Control Requirement: Users must be aware of their responsibilities for keeping authentication info confidential.

Required Implementation Step: Deliver a technical briefing specifically for developers and sysadmins on the dangers of hardcoding secrets in Git repositories. Implement pre-commit hooks that scan for secrets before they are pushed to the codebase.

Minimum Requirement: Training records for the technical team and a log of “clean” scans from the secret-detection tool.

10. Audit Authentication Logs for Anomalies

Control Requirement: Access and changes to authentication information must be logged and monitored.

Required Implementation Step: Configure system logs to capture successful logins, failed attempts, and password changes. Set up a manual monthly review process to inspect logs for “impossible travel” or suspicious credential-stuffing patterns that automated tools might miss.

Minimum Requirement: A signed log review report for the previous month, highlighting any investigated security events.

ISO 27001 Annex A 5.17 SaaS / GRC Platform Implementation Failure Checklist

Control RequirementThe ‘Checkbox Compliance’ TrapThe Reality Check
Lifecycle ManagementThe GRC tool links to a PDF policy and marks the control as “Green”.The tool has no visibility into whether the policy is actually followed in the server room.
Secure StorageDashboard reports “Encryption at rest” based on a cloud provider API.It doesn’t check if the application is hashing passwords before they hit the encrypted disk.
MFA EnforcementThe tool sees an “MFA Enabled” toggle in Microsoft 365.It misses the legacy IMAP/POP3 ports that allow attackers to bypass MFA entirely.
Default CredentialsGRC platforms assume defaults are changed because “Security Policy” says so.They cannot scan your internal CCTV or printer VLANs where “admin/admin” usually survives.
Service AccountsThe tool ignores service accounts as they are “non-human”.Hardcoded API keys in GitHub are the #1 cause of breaches, which GRC tools rarely scan.
RevocationThe tool checks if a user is “Deleted” in the primary SSO.It fails to find the local ‘root’ or ‘maintenance’ accounts shared by the team.
Password StrengthThe GRC tool checks the “Setting” in the Azure portal.It doesn’t verify if developers have bypassed these settings for “test” accounts in production.
Credential IntegrityThe tool relies on self-attestation from system owners.System owners often lie or don’t understand the underlying crypto implementation.

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Fay Barker - High Table - ISO27001 Director
Shopping Basket
Scroll to Top