Authentication

What is Authentication?

Authentication is the systematic process of verifying the claimed identity of a user, device, or system entity. The primary implementation requirement involves multi-factor verification to ensure the business benefit of preventing unauthorised access, maintaining data integrity, and strictly adhering to the global ISO 27001 information security standards.

What is Authentication?

Authentication is the process of verifying the identity of a user, person, or device. In the context of information security, it confirms that a user is who they claim to be before granting them access to a system, application, or network. It is a critical component of access control.

Common Methods & Examples

  • Something you know: Knowledge-based factors.
    • Example: A username and password, or a PIN.
  • Something you have: Possession-based factors.
    • Example: A keycard, a physical token, or a one-time code sent to your phone.
  • Something you are: Inherence-based factors.
    • Example: Biometrics, such as a fingerprint, facial scan, or voice recognition.

ISO 27001 Context

ISO 27001 requires robust authentication mechanisms to protect information assets (ISO 27001 Annex A 8.5 Secure Authentication). It includes a requirements on authentication information (ISO 27001 Annex A 5.17 Authentication Information).

How to implement Authentication

Implementing robust authentication is a cornerstone of ISO 27001 compliance, ensuring that only verified identities access your organisation’s sensitive data. As a Lead Auditor, I recommend following this technical roadmap to align your identity verification processes with Annex A controls and the broader Information Security Management System (ISMS) requirements.

1. Formalise the Authentication Policy

Establish a comprehensive policy that defines the rules for identity verification across the organisation. This document serves as your Rules of Engagement, specifying requirements for password complexity, multi-factor authentication, and biometric usage to ensure a standardised approach to security.

  • Define minimum password length and character diversity.
  • Specify which systems require Multi-Factor Authentication (MFA).
  • Document the “Rules of Engagement” for third-party access.

2. Update the Asset Register for Access Control

Identify and categorise all hardware, software, and cloud applications that require authentication. By linking authentication requirements to your Asset Register, you can prioritise high-risk assets for enhanced security measures like hardware-based security keys.

  • Map every software asset to a specific authentication level.
  • Identify legacy systems that may require compensating controls.
  • Record the owner for each authenticated system.

3. Deploy Multi-Factor Authentication (MFA)

Provision MFA across all external-facing services and privileged accounts. Implementing a combination of something the user knows, has, or is significantly reduces the risk of account takeover from stolen credentials.

  • Mandate MFA for all cloud-based applications (SaaS).
  • Use authenticator apps or hardware tokens rather than SMS where possible.
  • Enforce MFA for all remote access via VPN or ZTNA.

4. Enforce Technical Password Standards

Configure system settings to automate the enforcement of your password policy. Technical controls prevent users from choosing weak passwords and reduce the likelihood of successful brute-force or dictionary attacks.

  • Disable the use of “common” or previously breached passwords.
  • Implement account lockout thresholds after repeated failed attempts.
  • Remove mandatory periodic password changes in favour of risk-based triggers.

5. Establish Identity and Access Management (IAM) Roles

Formalise user roles and permissions based on the principle of least privilege. By defining IAM roles, you ensure that users are granted only the minimum level of access required to perform their specific job functions.

  • Create Role-Based Access Control (RBAC) templates.
  • Document the permissions associated with each organisational role.
  • Verify that administrative privileges are strictly segregated.

6. Formalise User Access Provisioning and Revocation

Implement a documented process for the creation, modification, and deletion of user accounts. Promptly revoking access during employee offboarding is critical to prevent unauthorised access by former staff or “privilege creep.”

  • Link the HR offboarding process to the IT revocation workflow.
  • Maintain a log of all access requests and approvals.
  • Use “Joiner, Mover, Leaver” (JML) templates for consistency.

7. Configure Secure Session Management

Apply automated controls to manage the duration and security of active user sessions. Secure session management prevents unauthorised access via unattended devices or hijacked session tokens.

  • Set automated inactivity timeouts for all sensitive applications.
  • Limit concurrent sessions for administrative accounts.
  • Ensure secure logout functionality is visible and functional.

8. Deploy Centralised Authentication Logging

Enable detailed event logging for all successful and failed login attempts. Centralising these logs allows for real-time monitoring and the identification of anomalous patterns, such as credential stuffing or geographic anomalies.

  • Send authentication logs to a central SIEM or log management tool.
  • Monitor for multiple failed attempts across different accounts.
  • Review logs regularly as part of your incident detection strategy.
  • Ensure logs include timestamps, source IP, and device ID.

9. Conduct Regular Access Audits

Perform periodic reviews of all user access rights and authentication configurations. These audits ensure that permissions remain appropriate over time and identify any rogue accounts that may have bypassed standard provisioning.

  • Schedule quarterly access reviews with department heads.
  • Verify that “orphaned” accounts for former staff have been deleted.
  • Audit the use of shared or service accounts.

10. Execute Security Awareness Training

Train all staff on the importance of secure authentication and the risks of social engineering. Educated users are your best defence against phishing, MFA fatigue, and credential harvesting attacks.

  • Deliver targeted training on identifying phishing attempts.
  • Educate users on the risks of password reuse across personal and work accounts.
  • Simulate MFA fatigue attacks to test organisational resilience.

Authentication FAQ

As a Lead ISO 27001 Auditor, I frequently encounter organisations struggling to differentiate between simple logins and robust identity verification. Below are the most common queries regarding authentication requirements within the ISO 27001 framework.

What is authentication in the context of ISO 27001?

Authentication is the technical process of verifying the claimed identity of a user, device, or system. Within an ISO 27001 Information Security Management System (ISMS), it serves as the primary gatekeeper, ensuring that only verified entities can access protected assets. Statistics show that compromised credentials are involved in over 80% of data breaches, making this control critical for risk mitigation.

Is Multi-Factor Authentication (MFA) mandatory for ISO 27001 compliance?

MFA is effectively mandatory for all high-risk access scenarios, including remote working and privileged administrative accounts, under Annex A 5.17 and 8.5. Implementing MFA can block 99.9% of account compromise attacks. Auditors expect to see MFA enforced across 100% of cloud-based services and external access points to meet the standard of “appropriate technical controls.”

How does authentication differ from authorisation?

Authentication confirms who a user is, while authorisation determines what that user is allowed to do. In ISO 27001, you must manage both: first, verify identity through secure credentials (authentication), and second, apply the Principle of Least Privilege via Role-Based Access Control (authorisation). You cannot have effective authorisation without a trusted authentication foundation.

What are the technical requirements for ISO 27001 authentication?

Technical requirements include enforcing password complexity (minimum 12 characters), implementing account lockouts after five failed attempts, and disabling inactive accounts within 30 days. Organisations must also:

  • Encrypt all authentication traffic in transit using TLS 1.2 or higher.
  • Ensure 100% of authentication logs are sent to a secure, centralised monitoring system.
  • Eliminate the use of shared or “generic” accounts to maintain individual accountability.

What are the business risks of poor authentication management?

Poor authentication leads to unauthorised data access, regulatory non-compliance, and significant financial loss. Under the UK GDPR, failure to implement adequate security measures like strong authentication can result in fines of up to £17.5 million or 4% of global annual turnover. Furthermore, 60% of small businesses that suffer a major data breach fail within six months of the event.

Stuart and Fay High Table

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top