Access control decisions only become effective when access rights are correctly granted, changed, and removed.
Annex A 5.18 exists to ensure organisations manage access rights in a controlled, business-led way throughout their lifecycle, so that people and systems have the access they need — and no more.
This control focuses on the practical execution of access control, turning policy and identity management into day-to-day action.

Annex A 5.18 of ISO 27001:2022 addresses the provisioning, modification, and revocation of access rights.
At a practical level, this means:
The control does not require complex workflows or tooling. It expects a clear, consistent process that prevents unauthorised, excessive, or lingering access.
Most access-related incidents are not caused by attackers breaking controls, but by:
Annex A 5.18 addresses these risks by ensuring access rights are actively managed, rather than assumed to remain appropriate indefinitely.
This control applies to:
Consistency across all user types is essential.
A pragmatic approach to Annex A 5.18 usually includes the following elements.
Access rights should be granted only after appropriate authorisation.
This typically involves:
Access should never be provisioned before authorisation is obtained.
Access is most manageable when it aligns with defined roles.
Role-aligned access:
Where roles are not formally defined, access decisions should still be justified against business responsibilities.
Access requirements often change before people leave the organisation.
Triggers for access modification include:
Failure to adjust access during role changes is a common source of hidden risk.
Access should be removed promptly when it is no longer justified.
This includes:
Revocation should cover both logical and physical access.
Privileged access carries higher risk and greater potential impact.
Organisations often apply:
Privilege should be controlled deliberately, not inherited by default.
Maintaining records of access changes supports:
Records do not need to be complex, but they should be reliable and protected.
Access risk accumulates quietly when rights are not actively managed.
Annex A 5.18 is about keeping access aligned with reality.
When access rights are managed effectively:
Access control does not stop at policy or identity creation. It succeeds or fails in how access rights are granted, changed, and removed over time.
That is the outcome Annex A 5.18 is designed to achieve.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today