Authentication Information

What is Authentication Information?

Authentication Information is the sensitive data used to verify user identities within an organisation. The Primary Implementation Requirement involves securing passwords, keys, and biometrics under Annex A 5.17, providing the Business Benefit of preventing credential compromise, mitigating data breach risks, and ensuring robust access control.

What is Authentication Information?

Authentication information refers to data that verifies a user’s identity. This info proves you are who you say you are. The most common types are things you know, like a password; things you have, like a phone or a key fob; and things you are, like a fingerprint.

Examples

  • Passwords: The secret word or phrase you type to log in.
  • PINs: The short number you use for your debit card or phone.
  • Security Questions: Questions like “What was your first pet’s name?”
  • Biometrics: Using your body, like a fingerprint or a face scan.
  • Tokens: A small device or a code sent to your phone.

Context

Imagine you want to get into your house. Your key is a form of authentication information because it proves you have permission to enter. Similarly, your password is a key for your digital accounts. For extra security, some systems need more than one key, like a password and a code from your phone. This is called multi-factor authentication (MFA).

How to implement Authentication Information

Managing authentication information effectively is a critical requirement of ISO 27001 Annex A 5.17, ensuring that passwords, cryptographic keys, and biometric data are handled with the highest level of security. As a Lead Auditor, I recommend following this 10 step technical roadmap to formalise your secret management lifecycle and mitigate the risk of credential compromise within your Information Security Management System (ISMS).

1. Formalise the Authentication Information Policy

Establish a documented policy that defines the specific requirements for creating, storing, and disposing of authentication secrets. This serves as your primary control document to ensure all staff and contractors understand their obligations regarding secret management.

  • Define minimum complexity requirements for passwords and passphrases.
  • Specify the approved methods for generating cryptographic keys.
  • Document the “Rules of Engagement” for handling shared credentials in emergency scenarios.

2. Define Roles and Responsibilities via IAM

Implement Identity and Access Management (IAM) roles to ensure that the management of authentication information follows the principle of least privilege. Assigning clear ownership prevents the unauthorized modification or exposure of sensitive verification data.

  • Assign “Secret Managers” for the oversight of administrative credentials.
  • Document responsibilities for the distribution of initial authentication information.
  • Review IAM role permissions quarterly to prevent privilege creep.

3. Establish Rules of Engagement for User Secrets

Create a formal Rules of Engagement (ROE) document that mandates how users must protect their own authentication information. Clear instructions reduce the likelihood of “social engineering” attacks and insecure local storage of passwords.

  • Prohibit the writing down or digital storage of secrets in unencrypted formats.
  • Mandate the immediate reporting of suspected credential compromises.
  • Enforce a strict “no-sharing” policy for individual user accounts.

4. Update the Asset Register for Secret Storage

Identify and record all systems and applications that store authentication information within your Asset Register. Knowing exactly where your secrets reside is essential for applying technical encryption controls and conducting risk assessments.

  • Log all hardware security modules (HSMs) used for key storage.
  • Categorise software-based “Secret Managers” as critical information assets.
  • Map the data flow of authentication information across cloud and on-premise environments.

5. Provision Multi-Factor Authentication (MFA) Protocols

Deploy MFA across all systems that manage or store sensitive authentication information. MFA acts as a vital compensating control, ensuring that a single compromised secret does not lead to a total system breach.

  • Enforce hardware-based MFA tokens for privileged administrative roles.
  • Implement time-based one-time passwords (TOTP) for standard user access.
  • Verify that MFA is enabled for all remote access and VPN endpoints.

6. Enforce Secure Storage and Encryption Standards

Configure technical systems to ensure that authentication information is never stored in plaintext. Using non-reversible hashing and strong encryption protects credentials even if the underlying database is compromised.

  • Use salted, non-reversible hashing algorithms like Argon2 or Bcrypt for password storage.
  • Apply AES-256 encryption for secrets held in transit and at rest.
  • Verify that default vendor passwords are changed immediately upon system deployment.

7. Implement Secure Lifecycle Management for Secrets

Develop a formal process for the secure distribution and revocation of authentication information. Controlling the lifecycle prevents “orphan accounts” and ensures that secrets are decommissioned securely when no longer required.

  • Use secure, out-of-band channels for the initial delivery of temporary credentials.
  • Force a password change upon the first login for all new users.
  • Automate the revocation of secrets during the employee offboarding process.

8. Automate Credential Rotation and Renewal

Deploy automated tools to manage the regular rotation of service account passwords and cryptographic keys. Automation removes human error and ensures that long-lived credentials do not become easy targets for brute-force attacks.

  • Set mandatory rotation periods for API keys and service tokens.
  • Configure “Just-In-Time” (JIT) access for high-privilege administrative tasks.
  • Monitor for expired certificates and keys to prevent service interruptions.

9. Audit Authentication Access Logs and Event Trails

Enable detailed logging for every event involving the modification or access of authentication information. Regular monitoring allows your security team to identify anomalous patterns that may indicate a credential-harvesting attempt.

  • Centralise logs in a secure SIEM (Security Information and Event Management) platform.
  • Alert on multiple failed attempts to access secret management tools.
  • Retain audit trails for a minimum of 12 months to satisfy ISO 27001 requirements.

10. Conduct Periodic Technical Compliance Reviews

Perform regular technical audits to verify that all authentication controls are functioning as intended. Continuous verification ensures that your organisation remains compliant with ISO 27001 standards as the threat landscape evolves.

  • Execute annual penetration tests specifically targeting authentication mechanisms.
  • Review the configuration of the Asset Register against actual network deployments.
  • Verify that all biometrics templates are stored as mathematical hashes rather than raw images.

Authentication Information FAQ

What is authentication information in the context of ISO 27001?

Authentication information is a protected category of data used to verify a user’s identity, such as passwords, cryptographic keys, and biometric templates. According to industry data, compromised credentials contribute to 81% of data breaches, making the secure management of this information a critical requirement for Annex A 5.17 compliance.

What are the specific requirements for ISO 27001 Annex A 5.17?

Annex A 5.17 requires organisations to establish a formal process for the management of authentication information throughout its entire lifecycle. This includes:

  • Secure creation and distribution of initial login credentials.
  • Mandatory requirements for users to change temporary passwords upon first use.
  • Prohibiting the storage of authentication information in plaintext or insecure locations.
  • Ensuring 100% of default vendor passwords are changed before system deployment.

How does ISO 27001 recommend storing authentication information?

Authentication information must be stored using strong, non-reversible cryptographic hashes combined with unique salts. ISO 27001 auditors look for industry-standard algorithms such as Bcrypt or Argon2 for passwords, and AES-256 for encrypted keys, ensuring that even in the event of a database leak, the raw credentials remain mathematically unfeasible to recover.

What are the risks of failing to manage authentication information?

Failure to protect authentication information leads to unauthorised access, data exfiltration, and severe regulatory penalties. Under the UK GDPR, organisations can face fines of up to £17.5 million or 4% of total annual global turnover, whichever is higher. Effective management reduces the risk of credential-stuffing attacks, which currently target over 10 billion accounts annually.

Does ISO 27001 require multi-factor authentication (MFA)?

MFA is considered a primary control for managing authentication information under Annex A 8.5 and 5.17 for high-risk systems. While the standard does not mandate a specific tool, it requires “appropriate technical controls” to verify identity. Implementing MFA can block over 99.9% of account compromise attacks, significantly strengthening the organisation’s overall security posture.

Relevant ISO 27001 Controls

The following controls from the ISO/IEC 27001:2022 standard are related to authentication information:

Stuart Barker - High Table - ISO27001 Director

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top