Most data breaches are not caused by hacking.
They happen because someone had access they didn’t need.
Annex A 8.3 exists to ensure organisations restrict access to information and ICT assets, so information is only accessible to authorised users, systems, and processes — and only to the extent required.
This control is about containing exposure, not enabling convenience.

Annex A 8.3 of ISO 27001:2022 focuses on information access restriction.
At a practical level, this means:
The control does not require a single access model. It expects deliberate, consistent restriction of access based on risk and role.
Information that is widely accessible is:
Common causes of access-related incidents include:
Annex A 8.3 ensures organisations treat access as a controlled capability, not a default entitlement.
This control replaces ISO 27001:2013 Annex A 9.4.1 and places stronger emphasis on granularity, monitoring, and dynamic access management.
A pragmatic approach to Annex A 8.3 typically includes the following elements.
Organisations should define rules that specify:
Rules should be aligned with information classification and business need.
Access should be granted only after:
Anonymous or uncontrolled access should be avoided, particularly for sensitive or business-critical information.
Broad access increases exposure.
Organisations should apply:
Granularity reduces impact when credentials are compromised.
Different user groups often require different levels of access.
This may include:
Access boundaries reduce lateral movement and misuse.
Annex A 8.3 applies to more than people.
Organisations should consider:
Non-human access often carries high privilege and low visibility.
Where information is shared externally or publicly:
Public access should never include confidential or business-critical data.
ISO 27001:2022 explicitly introduces the concept of dynamic access management.
This may involve:
Dynamic controls are particularly useful where information is shared externally or accessed remotely.
Where risk justifies it, organisations should:
Visibility supports detection, investigation, and accountability.
Effective access restriction includes response capability.
Organisations may:
Restriction without detection delays response.
Access requirements change.
Organisations should review access:
Access that is no longer justified should be removed promptly.
Annex A 8.3 does not require:
It does require organisations to:
Most access-related incidents are preventable.
Access control fails quietly — until it doesn’t.
Annex A 8.3 is about reducing exposure by design.
When information access restriction is implemented effectively:
Information does not need to be hidden from everyone.
It needs to be accessible to the right people, at the right time, for the right reason.
That is exactly what Annex A 8.3 is designed to achieve.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today