Access control decisions only become effective when access rights are correctly granted, changed, and removed.
Annex A 5.18 exists to ensure organisations manage access rights in a controlled, business-led way throughout their lifecycle, so that people and systems have the access they need, and no more.
This control focuses on the practical execution of access control, turning policy and identity management into day-to-day action.

Annex A 5.18 of ISO 27001:2022 addresses the provisioning, modification, and revocation of access rights.
At a practical level, this means:
The control does not require complex workflows or tooling. It expects a clear, consistent process that prevents unauthorised, excessive, or lingering access.
Most access-related incidents are not caused by attackers breaking controls, but by:
Annex A 5.18 addresses these risks by ensuring access rights are actively managed, rather than assumed to remain appropriate indefinitely.
This control applies to:
Consistency across all user types is essential.
A pragmatic approach to Annex A 5.18 usually includes the following elements.
Access rights should be granted only after appropriate authorisation.
This typically involves:
Access should never be provisioned before authorisation is obtained.
Access is most manageable when it aligns with defined roles.
Role-aligned access:
Where roles are not formally defined, access decisions should still be justified against business responsibilities.
Access requirements often change before people leave the organisation.
Triggers for access modification include:
Failure to adjust access during role changes is a common source of hidden risk.
Access should be removed promptly when it is no longer justified.
This includes:
Revocation should cover both logical and physical access.
Privileged access carries higher risk and greater potential impact.
Organisations often apply:
Privilege should be controlled deliberately, not inherited by default.
Maintaining records of access changes supports:
Records do not need to be complex, but they should be reliable and protected.
Access risk accumulates quietly when rights are not actively managed.
Annex A 5.18 is about keeping access aligned with reality.
When access rights are managed effectively:
Access control does not stop at policy or identity creation. It succeeds or fails in how access rights are granted, changed, and removed over time.
That is the outcome Annex A 5.18 is designed to achieve.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today