How to Implement ISO 27001 Annex A 5.3: Segregation of Duties

How to Implement ISO 27001 Annex A 5.3

Implementing ISO 27001 Annex A 5.3 is the operational enforcement of segregation of duties to minimize the risk of internal fraud and error. This control requires organizations to divide critical business functions between multiple individuals, ensuring that no single person has the authority to initiate, approve, and execute high-risk transactions. By establishing these checks and balances, companies protect assets and ensure accountability.

ISO 27001 Annex A 5.3 Implementation Checklist

Use this implementation checklist to achieve compliance with ISO 27001 Annex A 5.3. This control ensures that conflicting duties are identified and managed to reduce the risk of unauthorised or unintentional modification of organisational assets.

Create a Segregation of Duties (SoD) Conflict Matrix

Control Requirement: Conflicting duties and areas of responsibility must be identified and segregated.

Required Implementation Step: Open a spreadsheet and list all high-risk business processes (e.g., procurement, payroll, system administration). Map these against job roles to identify “conflicts” where one person could perform and conceal a malicious act.

Minimum Requirement: A documented table identifying at least three key areas (Finance, IT, and HR) where duties are split between two different people.

Audit Active Directory Domain Administrator Privileges

Control Requirement: Access to high-level administrative functions must be restricted to prevent a single point of failure or misuse.

Required Implementation Step: Go to your Active Directory or Azure AD management console and export the ‘Domain Admins’ or ‘Global Admins’ group. Remove any users who do not require these rights for their primary daily tasks.

Minimum Requirement: A screenshot of the admin group showing that no more than two named individuals have full system-wide administrative authority.

Separate Financial Approval and Payment Execution

Control Requirement: Responsibility for initiating a transaction must be separate from the responsibility for approving it.

Required Implementation Step: Open your online banking portal or accounting software settings. Verify that the “Maker/Checker” or “Dual Authorisation” feature is active for all outgoing payments and payroll runs.

Minimum Requirement: A redacted bank statement or portal screenshot showing two different user IDs required for a single transaction approval.

Mandate Peer Review for Source Code Commits

Control Requirement: Technical changes must be reviewed by someone other than the person who developed the change.

Required Implementation Step: Navigate to your Git repository settings (GitHub, GitLab, or Bitbucket). Enable “Branch Protection” on your ‘main’ or ‘production’ branches to require a pull request and at least one independent approval before merging.

Minimum Requirement: A sample Pull Request (PR) log showing the developer’s name and a different colleague’s approval name.

Restrict Developer Access to Production Environments

Control Requirement: Development, testing, and operational environments must be separated to reduce the risk of unauthorised changes.

Required Implementation Step: Audit your cloud environment (AWS, GCP, or Azure) IAM roles. Ensure that users with the ‘Developer’ role do not have ‘Owner’ or ‘Contributor’ permissions on production resources or databases.

Minimum Requirement: A policy document or system export proving that the production database password is not known by the development team.

Implement Multi-Stage Change Management Approvals

Control Requirement: Changes to systems must be approved by an authorised party who is independent of the person making the change.

Required Implementation Step: Look at your last three system changes. Ensure the ‘Request for Change’ (RFC) was signed off by a manager or Change Advisory Board (CAB) rather than the engineer who performed the update.

Minimum Requirement: An email trail or change log entry where a supervisor approves a change before it is executed on live systems.

Isolate Physical Key Management from Access Authorisation

Control Requirement: Physical access controls must be segregated to prevent unauthorised entry through collusion or administrative error.

Required Implementation Step: Go to your office security records. Ensure that the person responsible for authorising a new staff member’s building access is not the same person who physically programmes the RFID fob or issues the physical key.

Minimum Requirement: A simple sign-off sheet where one manager authorises access and a separate ‘Security Officer’ confirms the fob was issued.

Review High-Privilege Third-Party Service Accounts

Control Requirement: Third-party access to organisational assets must be monitored and segregated from internal administrative roles.

Required Implementation Step: Examine your external vendor list. Ensure that any MSP or consultant has an individual, auditable account rather than using shared ‘Admin’ credentials, and that their access is restricted only to the systems they support.

Minimum Requirement: A contract clause or system log showing that third-party access is ‘Just-in-Time’ or requires internal sponsor approval for each session.

Formalise the Employee Onboarding Access Request Process

Control Requirement: Access rights must be provisioned based on role requirements, ensuring no single role accumulates conflicting permissions.

Required Implementation Step: Open your HR onboarding checklist. Ensure that IT only grants access once an ‘Access Request Form’ is received, specifying the role-based permissions needed rather than “copying” the access of another employee.

Minimum Requirement: A completed Access Request Form for the most recent hire, signed by their line manager.

Perform Quarterly Governance Access Re-certifications

Control Requirement: Access rights and assigned duties must be reviewed at planned intervals to identify role-creep or conflicts.

Required Implementation Step: Set a recurring calendar invite for every 90 days. Manually review all users with administrative or financial authority and document that they still require those rights and that no new SoD conflicts have been created.

Minimum Requirement: A signed and dated memo or spreadsheet from the Information Security Officer confirming the quarterly access review was completed.

ISO 27001 Annex A 5.3 SaaS / GRC Platform Implementation Failure Checklist

Control RequirementThe ‘Checkbox Compliance’ TrapThe Reality Check
Identify Conflicting DutiesUploading a generic “Segregation of Duties Policy” to the GRC dashboard and marking it “Done”.The auditor will ask to see your actual SoD Matrix and how it applies to your specific staff names.
Technical SegregationThe GRC tool shows a green tick because you linked it to an IAM policy.An auditor will look at the live AWS/Azure console to see if developers *actually* have write-access to Prod.
Dual AuthorisationSetting a “Review Task” in the SaaS platform that any user can mark as complete.Showing an immutable bank log or code-merge history where the approver is a different human than the submitter.
Role Re-certificationAutomated emails from the tool that managers “Accept All” without looking.Interviewing a manager to ask *why* a specific person has a specific privilege and seeing if they know the answer.
Physical SegregationRelying on a SaaS tool that only monitors digital logs but ignores physical keys/fobs.Checking the physical sign-out sheet for the office server room keys.
Change IndependenceLinking a Jira ticket to a GRC control without verifying who the reporter and assignee were.Verifying that the person who typed the code is not the person who clicked “Deploy to Production”.
Access ProvisioningUsing “Role Based Access” in the GRC tool that doesn’t actually sync with your real IT systems.Comparing the GRC “Owner List” to the actual HR payroll list to find “Ghost” accounts or role-creep.
ISO 27001 Toolkit

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top