ISO 27001:2022 Access Control Policy Generator
Generate comprehensive, audit-ready access control policies aligned with international information security standards in minutes.
Act as a senior Information Security Consultant specializing in ISO 27001:2022 compliance and governance documentation. Your task is to draft a comprehensive, legally defensible Access Control Policy for [ORGANIZATION_NAME] that strictly adheres to ISO 27001:2022 controls 5.15 (Access control), 5.18 (Access rights), 8.2 (Privileged access rights), 8.5 (Secure authentication), and 8.18 (Use of privileged utility programs). CONTEXT: - Organization Type: [ORGANIZATION_TYPE] (e.g., SaaS provider, financial institution, healthcare, manufacturing) - Scope: [SCOPE_DESCRIPTION] (e.g., all information systems, cloud infrastructure, on-premise data centers, industrial control systems) - Risk Appetite: [RISK_LEVEL] (Low/Medium/High) - Current Technology Stack: [TECH_STACK] (e.g., Active Directory, AWS IAM, Azure AD, Okta, CyberArk) - Regulatory Requirements: [ADDITIONAL_COMPLIANCE] (e.g., GDPR, HIPAA, SOC2, PCI-DSS, NIS2) - Workforce Size/Structure: [WORKFORCE_CONTEXT] (e.g., 500 employees hybrid, 50 contractors offshore) REQUIREMENTS: 1. **Document Control**: Include version history, document owner (CISO/IT Director), approval authority, and review cycle (annual minimum). 2. **Purpose & Scope**: Explicitly state alignment with ISO 27001:2022 and define boundaries (what is in/out of scope). 3. **Policy Principles**: - Mandatory least privilege and need-to-know - Unique user IDs for all systems (no shared accounts except documented emergency break-glass) - Password complexity per NIST SP 800-63B or organizational baseline - Multi-factor authentication (MFA) requirements for [MFA_REQUIREMENTS] 4. **Access Control Models**: Specify RBAC, ABAC, or PBAC implementation approach. 5. **User Access Lifecycle Management**: - Provisioning workflow (HR trigger, manager approval, IT implementation) - De-provisioning (immediate termination vs. 24-hour grace period) - Access recertification frequency (quarterly for privileged, annual for standard) - Transfer procedures (add/remove matrix) 6. **Privileged Access Management (PAM)**: - Definition of privileged accounts (domain admin, root, database sa, cloud super-user) - Just-in-Time (JIT) access and time-bound elevation requirements - Privileged session recording and keystroke logging - Separation of duties (SoD) constraints for critical functions 7. **Authentication & Identity Standards**: SSO mandates, password policy specifics, biometric acceptance criteria, and federated identity rules. 8. **Third-Party/Remote Access**: VPN requirements, vendor access limitations, and zero-trust network access (ZTNA) policies. 9. **Violations & Enforcement**: Disciplinary actions, escalation paths to HR/Legal, and incident response triggers. 10. **Exceptions Management**: Formal exception request process, risk acceptance authority levels, and maximum exception durations (e.g., 90 days renewable once). 11. **Compliance Mapping**: Append a table mapping each policy section to specific ISO 27001:2022 controls. FORMAT: - Use formal policy language (shall/must for requirements, may for recommendations) - Include [PLACEHOLDERS] in brackets for organization-specific details requiring human verification - Structure with hierarchical numbering (1.0, 1.1, 1.2) for audit traceability - Total length: 1,500–2,500 words - Tone: Authoritative, precise, enforceable, and aligned with enterprise risk management CONSTRAINTS: Do not include specific vendor product configuration steps (keep it policy-level, not procedural). Do not suggest controls weaker than ISO 27001:2022 baseline regardless of risk appetite.
Act as a senior Information Security Consultant specializing in ISO 27001:2022 compliance and governance documentation. Your task is to draft a comprehensive, legally defensible Access Control Policy for [ORGANIZATION_NAME] that strictly adheres to ISO 27001:2022 controls 5.15 (Access control), 5.18 (Access rights), 8.2 (Privileged access rights), 8.5 (Secure authentication), and 8.18 (Use of privileged utility programs). CONTEXT: - Organization Type: [ORGANIZATION_TYPE] (e.g., SaaS provider, financial institution, healthcare, manufacturing) - Scope: [SCOPE_DESCRIPTION] (e.g., all information systems, cloud infrastructure, on-premise data centers, industrial control systems) - Risk Appetite: [RISK_LEVEL] (Low/Medium/High) - Current Technology Stack: [TECH_STACK] (e.g., Active Directory, AWS IAM, Azure AD, Okta, CyberArk) - Regulatory Requirements: [ADDITIONAL_COMPLIANCE] (e.g., GDPR, HIPAA, SOC2, PCI-DSS, NIS2) - Workforce Size/Structure: [WORKFORCE_CONTEXT] (e.g., 500 employees hybrid, 50 contractors offshore) REQUIREMENTS: 1. **Document Control**: Include version history, document owner (CISO/IT Director), approval authority, and review cycle (annual minimum). 2. **Purpose & Scope**: Explicitly state alignment with ISO 27001:2022 and define boundaries (what is in/out of scope). 3. **Policy Principles**: - Mandatory least privilege and need-to-know - Unique user IDs for all systems (no shared accounts except documented emergency break-glass) - Password complexity per NIST SP 800-63B or organizational baseline - Multi-factor authentication (MFA) requirements for [MFA_REQUIREMENTS] 4. **Access Control Models**: Specify RBAC, ABAC, or PBAC implementation approach. 5. **User Access Lifecycle Management**: - Provisioning workflow (HR trigger, manager approval, IT implementation) - De-provisioning (immediate termination vs. 24-hour grace period) - Access recertification frequency (quarterly for privileged, annual for standard) - Transfer procedures (add/remove matrix) 6. **Privileged Access Management (PAM)**: - Definition of privileged accounts (domain admin, root, database sa, cloud super-user) - Just-in-Time (JIT) access and time-bound elevation requirements - Privileged session recording and keystroke logging - Separation of duties (SoD) constraints for critical functions 7. **Authentication & Identity Standards**: SSO mandates, password policy specifics, biometric acceptance criteria, and federated identity rules. 8. **Third-Party/Remote Access**: VPN requirements, vendor access limitations, and zero-trust network access (ZTNA) policies. 9. **Violations & Enforcement**: Disciplinary actions, escalation paths to HR/Legal, and incident response triggers. 10. **Exceptions Management**: Formal exception request process, risk acceptance authority levels, and maximum exception durations (e.g., 90 days renewable once). 11. **Compliance Mapping**: Append a table mapping each policy section to specific ISO 27001:2022 controls. FORMAT: - Use formal policy language (shall/must for requirements, may for recommendations) - Include [PLACEHOLDERS] in brackets for organization-specific details requiring human verification - Structure with hierarchical numbering (1.0, 1.1, 1.2) for audit traceability - Total length: 1,500–2,500 words - Tone: Authoritative, precise, enforceable, and aligned with enterprise risk management CONSTRAINTS: Do not include specific vendor product configuration steps (keep it policy-level, not procedural). Do not suggest controls weaker than ISO 27001:2022 baseline regardless of risk appetite.
More Like This
Back to LibraryAdvanced Multi-Platform Threat Hunting Query Generator
This prompt helps security analysts, threat hunters, and detection engineers convert vague threat scenarios and IOCs into structured, tiered query sets. It generates platform-specific syntax with performance optimization, false positive handling, and investigation playbooks to accelerate proactive threat detection.
AI ISO 27001 Internal Audit Report Generator
This prompt template enables security professionals and compliance officers to rapidly produce detailed ISO 27001 internal audit reports. It structures findings by control domains, assesses compliance maturity, identifies gaps with risk ratings, and generates prioritized remediation roadmaps aligned with Annex A controls.
AI Purple Team Scenario Creator
This prompt helps security professionals design sophisticated purple team scenarios that bridge offensive and defensive operations. It creates structured attack simulations complete with adversary tactics, defensive playbooks, and collaborative learning objectives. Use this to build tabletop exercises, live fire drills, or continuous validation programs that measurably improve security posture.