The breach began with one login. One privileged account connected to a critical system. Within hours, an attacker moved laterally, escalated rights, and exfiltrated data that should never have left the network. This is why ISO 27001 treats Privileged Access Management (PAM) as a core control for protecting information assets.
ISO 27001 requires organizations to identify, control, and monitor privileged accounts. PAM is the framework and set of tools to enforce these controls. Under Annex A.9 and A.12, the standard specifies strict management of administrative privileges, both at the system and application level. Poor handling of these accounts is one of the most common causes of data breaches.
An effective ISO 27001-aligned PAM program starts with a complete inventory of privileged accounts. Map every admin account, service account, API key, root access, SSH key, and database credential. Remove unused accounts. Apply the principle of least privilege to all that remain. Privileges should match the exact role requirements—no more, no less.