Most major security incidents don’t start with malware.
They start with too much access, held for too long.
Annex A 8.2 exists to ensure organisations strictly control, monitor, and review privileged access rights, reducing the risk of misuse, abuse, or accidental damage to systems and information.
This control is about containing power — not trusting it.

Annex A 8.2 of ISO 27001:2022 focuses on management of privileged access rights.
At a practical level, this means:
The control does not prohibit privileged access. It expects organisations to treat it as high-risk, temporary, and auditable.
Privileged access typically allows users to:
When privileged access is:
…the impact of error or abuse increases dramatically.
Annex A 8.2 ensures organisations do not normalise elevated access, but instead control it deliberately and defensibly.
This control replaces ISO 27001:2013 Annex A 9.2.3 and introduces stronger emphasis on logging, re-authentication, and time-bound access.
A pragmatic approach to Annex A 8.2 typically includes the following elements.
Organisations should identify:
Not all administrators need the same level of access.
Privileged access should be:
Standing privilege increases exposure without adding value.
Privileged access should:
The goal is enough access to do the job — nothing more.
Organisations should maintain records showing:
These records support auditability and accountability.
Privileged access should not persist indefinitely.
Organisations should:
Expired access is one of the most common findings in audits and incidents.
Users should be explicitly aware when operating with elevated privileges.
This reduces:
Awareness supports responsible behaviour.
For higher-risk systems, organisations should consider:
This reduces risk from session hijacking or unattended access.
Annex A 8.2 places strong emphasis on visibility.
Organisations should:
Unlogged privilege is uncontrolled privilege.
Where feasible, organisations may:
This improves traceability and reduces accidental misuse.
Shared credentials undermine accountability.
Organisations should avoid:
If accountability cannot be established, control is weakened.
Annex A 8.2 explicitly supports controlled emergency access.
Break-glass access should:
Emergency access should be exceptional — not convenient.
Privileged access should be reviewed:
Access that is no longer justified should be removed promptly.
Annex A 8.2 does not require:
It does require organisations to:
Most major breaches involve legitimate credentials.
Privilege misuse is rarely malicious — it is usually unmanaged.
Annex A 8.2 is about reducing the blast radius of trust.
When privileged access rights are managed effectively:
Privilege is necessary.
Uncontrolled privilege is dangerous.
Annex A 8.2 ensures organisations keep the difference clear.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today