top of page
  • Writer's pictureSara Flemington

ISO 27002 unlocked#1: Segregation of duties



 

 The principle of segregation of duties is a crucial aspect of the ISO 27002 standard, a widely recognized framework for information security management.


This principle is rooted in the belief that no one person should be solely responsible for all aspects of a single process or activity. By implementing the Segregation of duties, organisations can safeguard against fraud, errors, and other forms of misuse.




principle in the ISO 27002 standard

Segregation of duties is an important principle in the ISO 27002 standard.






Segregation of duties is often referred to as the "separation of duties" or "splitting of responsibilities" principle. It involves dividing responsibilities among different individuals or groups to ensure that no one person has complete control over a critical business process or activity.



The ISO 27002 standard provides guidance on implementing segregation of duties in an organization's information security management system (ISMS). This includes:


1. Defining roles and responsibilities: Clearly defining the roles and responsibilities of individuals involved in critical business processes or activities.


2. Separating roles and responsibilities: Separating the roles and responsibilities of individuals involved in critical business processes or activities to ensure that no single individual has complete control over the process.


3. Implementing checks and balances: Implementing checks and balances to ensure that no single individual can complete a critical business process or activity without oversight or approval from another individual or group.


4. Monitoring and reviewing: Monitoring and reviewing the effectiveness of segregation of duties controls to ensure that they are functioning as intended.



Here are some examples of how Segregation of duties can be implemented in an organisation:


  • Separating the roles of system administrators and developers: One common implementation of segregation of duties is separating the roles of system administrators and developers. The system administrators are responsible for managing the production environment, while developers are responsible for creating new code and applications. This separation helps to prevent developers from having direct access to the production environment, which could increase the risk of unauthorized changes or errors.


  • Requiring dual approval for financial transactions: Another example of segregation of duties is requiring dual approval for financial transactions. This means that two individuals must review and approve each financial transaction, such as a purchase order or invoice, to ensure that no single individual has complete control over the process.


  • Segregating the roles of quality assurance and testing: In software development, segregation of duties can be implemented by segregating the roles of quality assurance and testing. The quality assurance team is responsible for ensuring that the software meets the required quality standards, while the testing team is responsible for testing the software for bugs and other issues. This separation helps to ensure that the software is thoroughly tested and meets the required quality standards.


  • Separating the roles of network administrators and security administrators: Another example of segregation of duties is separating the roles of network administrators and security administrators. The network administrators are responsible for managing the network infrastructure, while security administrators are responsible for implementing and managing the security controls. This separation helps to prevent conflicts of interest and ensures that the security controls are implemented and managed by individuals with the necessary expertise.


Implementing Information Security Management System has become a necessary reality for nowadays businesses. Let us help you get ISO 27001 Certification. 



Our team of ISO 27001 experts at APIC Management design and implement your Information Security Management System, so you can safely focus on your core business and growth.

 

  


 

 

 

 

15 views0 comments

Comments


bottom of page