ISO/IEC 27001 Control 5.10: Acceptable use of information and other associated assets

Control

Rules for the acceptable use and procedures for handling information and other associated assets should be identified, documented and implemented.

Necessity of MidPoint

MidPoint is necessary to implement this control properly.

MidPoint features and capabilities are essential for efficient implementation of this control. While it is theoretically possible to implement this control without a comprehensive IGA platform in place, the implementation is likely to be inefficient, costly, slow and unreliable in the long run. MidPoint can make implementation of this control efficient and reliable.

Implementation Overview

Audit trail, object history and meta-data can be used to record access rights information.

Implementation Details

MidPoint assignments provide a record of authorized users of information, including meta-data recording reasons for assigning the rights. Notifications can be used to deliver guidance on acceptable use of the system at the moment the account is created on the system. MidPoint can use audit trail to record access rights of users that have or had access to assets. Object history feature can be used to reveal access rights or users related to an asset in the past.

Rationale

MidPoint has supporting features to manage acceptable use of information.

Was this page helpful?
YES NO
Thanks for your feedback