🇰🇷ISMS-P ISMS-2.5Rule: ISMSP-004critical

Access Control

Description

Access control policies + procedures implemented across all systems.

⚠️ Risk Impact

Korean enterprise environments are particularly susceptible to insider-threat scenarios; access control is the foundational defense.

🔍 How EchelonGraph Detects This

ISMSP-004Automated scanner rule

EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as critical-severity findings with remediation guidance.

🔧 Remediation

RBAC + MFA universal. Quarterly access reviews. Automated provisioning/deprovisioning.

💀 Real-World Attack Scenario

A Korean retailer's terminated employees retained access for 60+ days. One sold customer data; PIPA enforcement action followed.

💰 Cost of Non-Compliance

Access-control failures: up to 3% of annual revenue (PIPA).

📋 Audit Questions

  • 1.Universal MFA?
  • 2.Quarterly access reviews?
  • 3.Automated lifecycle?

🎯 MITRE ATT&CK Mapping

T1078 — Valid Accounts

⚡ Common Pitfalls

  • MFA partial
  • Manual deprovisioning
  • Reviews skipped

📈 Business Value

Strong access control is foundational to ISMS-P + reduces insider-threat risk.

⏱️ Effort Estimate

Manual

Quarterly reviews

With EchelonGraph

EchelonGraph integrates with IdP for continuous access audit

🔗 Cross-Framework References

ISO27001-A.5.15

Automate ISMS-P ISMS-2.5 compliance

EchelonGraph continuously monitors this control across all your cloud accounts.

Start Free →