The build froze. A single wrong permission had let one engineer push code and approve it. Nobody saw the flaw until production burned.
ISO 27001 calls this out as a control: Separation of Duties. It means no single person should have unchecked power over a process. One writes the code, another reviews, a third deploys. This reduces risk, stops fraud, and catches mistakes before they ship.
Under ISO 27001, Separation of Duties falls within Annex A.9 and A.6. It’s tied to access control and role assignment. You define responsibilities, then enforce them with technical and procedural rules. This is not just policy on paper. It is applied through permissions, source control rules, CI/CD pipelines, and account segregation.
Separation of Duties works best when roles are crystal-clear. No overlap that allows bypass. Developers have dev access, not production keys. Reviewers cannot push without a second check. Admins cannot approve their own changes. Every significant action has an independent verifier.