A.5.17 Authentication information
- Andy Systems
- ISMS Guides
A.5.17 Authentication Information would include:
-
Authentication Methods: Documentation of the various authentication methods used within the organization, such as passwords, biometrics, smart cards, tokens, or multi-factor authentication (MFA).
-
Password Policies: Proof of documented password policies, including complexity requirements, minimum length, expiration intervals, and rules for creating strong passwords.
-
Biometric Authentication: If biometric authentication is used, evidence of the technology and procedures in place to securely capture, store, and verify biometric data.
-
Tokens and Smart Cards: Documentation of token or smart card issuance processes, including how they are distributed, activated, and deactivated.
-
Multi-Factor Authentication (MFA): Information about MFA implementation, including the specific factors used (e.g., something the user knows, has, or is), and how MFA is enforced for different systems.
-
Single Sign-On (SSO): Documentation of SSO solutions and how they streamline the authentication process for users while ensuring security.
-
Authentication Management System: Proof of a centralized system or tool used to manage and monitor authentication methods, user accounts, and access rights.
-
Authentication Tokens and Secrets: Records of issued authentication tokens, secrets, or credentials, and how they are securely stored and managed.
-
Access Control Policies: Documentation of how authentication information is used to grant or deny access to specific resources based on user roles and permissions.
-
Monitoring and Logging: Evidence of monitoring and logging mechanisms that track authentication activities, failed login attempts, and successful logins, along with timestamps and user details.
-
Security Awareness Training: Records of training provided to users regarding the importance of protecting their authentication information and using secure authentication practices.
-
Compliance Audits: Documentation of audits or assessments conducted to verify that authentication practices align with regulatory requirements and industry standards.
-
Incident Response Plans: Documentation of plans outlining how the organization responds to unauthorized access attempts, compromised authentication information, or authentication-related incidents.
-
User Behavior Analytics: If used, information about tools or systems that analyze user behavior to detect abnormal or unauthorized access patterns.
-
Vendor and Supplier Authentication: If applicable, evidence of how authentication practices are extended to external vendors or suppliers who access organizational systems.
By reviewing these pieces of evidence, an auditor can assess whether the organization has established secure and appropriate authentication methods, policies, and controls to ensure the proper verification of users' identities and protect sensitive information and resources from unauthorized access.