User registration and de-registration

ISO/IEC 27017 Clause 9.2.1 requires you to run a formal, repeatable process to register (provision) users and de-register (revoke) users for cloud services, so access rights are assigned deliberately and removed promptly. To operationalize it, define ownership, standard workflows, approval rules, and revocation triggers, then retain evidence that every join/move/leave event was handled.

Key takeaways:

  • Put a documented, auditable workflow around account creation, change, and termination for cloud services.
  • Tie registration to identity proofing, authorization, and least-privilege role assignment, not ad hoc requests.
  • Tie de-registration to HR/offboarding and third-party disengagement so access is removed quickly and consistently.

“User registration and de-registration” sounds basic, but auditors and incident responders treat it as a primary control that either prevents misuse or accelerates containment. In cloud environments, the blast radius of a single orphaned admin account, stale API key, or shared credential can be large because access often spans storage, compute, CI/CD, and management planes.

ISO/IEC 27017:2015 Clause 9.2.1 is narrow in wording but broad in operational impact: you need a formal process that enables assignment of access rights for cloud services. “Formal” is the operative word. You are expected to show defined steps, responsible roles, approvals, and records that demonstrate the process ran for real people and real accounts over time.

This page translates the requirement into an execution plan a Compliance Officer, CCO, or GRC lead can hand to IAM, IT, Security, and application owners. It also highlights the evidence set auditors typically request and the implementation traps that create exceptions and repeat findings.

Regulatory text

Requirement (verbatim): “A formal user registration and de-registration process shall be implemented to enable assignment of access rights for cloud services.” 1

Operator interpretation: You must define and run a controlled workflow for:

  • Registration: creating a user identity and granting access rights to cloud services based on approved authorization.
  • De-registration: disabling/removing access when no longer authorized (termination, role change, contract end, inactivity rules you define).

Auditors will look for: (1) a documented process, (2) consistent execution, and (3) evidence that access rights match approved requests and are removed when required.

Plain-English requirement interpretation

You need a “joiner/mover/leaver” process for cloud access that is standardized, owned, and provable. The process must:

  • Prevent unauthorized access (no accounts created without approval and identity).
  • Enforce least privilege (access reflects job function and scope).
  • Remove access promptly when the business relationship or need ends.
  • Work for employees, contractors, and third parties who touch your cloud tenant(s).

Who it applies to (entity and operational context)

Applies to:

  • Cloud Service Providers (CSP context): Your internal administrative access to the cloud platform you operate, plus customer/tenant administrative workflows if you provide a management plane. 1
  • Cloud Service Customers: Your workforce and third parties accessing IaaS/PaaS/SaaS and the cloud management plane (for example, console access, IAM roles, API keys, service accounts). 1

Operational scope typically includes:

  • Workforce identities (SSO users, directory accounts).
  • Privileged access (cloud admins, break-glass access).
  • Non-human identities (service accounts, CI/CD identities, API keys).
  • Federated access (partners, consultants, customer support tooling).
  • Access paths to production data and security tooling (logs, KMS, secrets stores).

What you actually need to do (step-by-step)

1) Define control ownership and the “system of record”

Decide who owns the process end-to-end:

  • Process owner: usually IAM lead or Security GRC with IT Operations.
  • Authorizers: department managers, system owners, data owners for sensitive scopes.
  • Provisioners: IAM/IT ops, or automated workflows through an identity platform.

Pick a system of record for identity (HRIS for employees; vendor/third-party management system for contractors; customer IAM for customer admins). Your workflows should start from that system of record, not from informal emails.

2) Standardize registration (provisioning) triggers

Define what events create access:

  • New hire onboarding
  • Contractor/third-party engagement
  • Internal transfer (mover)
  • Temporary elevated access (time-bound)
  • Emergency access (break-glass)

For each trigger, define required inputs:

  • Unique identity (no shared accounts except documented service accounts)
  • Requestor and approver
  • Access scope (roles/groups), environment (prod vs non-prod), and justification
  • Start date and (if applicable) end date

3) Implement identity proofing and uniqueness rules

Registration must include a check that the user is real, authorized, and uniquely identified:

  • Employees: match HR record.
  • Contractors/third parties: match contract owner sponsorship and engagement record.
  • Customers (if applicable): match customer admin authorization path.

Add rules to prevent:

  • Duplicate accounts for the same person
  • Shared “team” logins
  • Creating local cloud-native users when federation is required (unless exception-approved)

4) Use role-based access models for cloud services

Translate business access into standardized access packages:

  • Define roles/groups mapped to job functions (engineering read-only, billing admin, security analyst).
  • Attach roles to specific cloud resources and environments.
  • Require explicit approval for privileged roles.

This is the fastest path to consistent provisioning and clean audit evidence because you can show “approved role assignment” instead of bespoke permission sets.

5) Build de-registration (revocation) triggers and timelines you can execute

De-registration should be triggered by:

  • Termination/offboarding
  • End of contract or statement of work
  • Role change (remove old access before adding new where feasible)
  • Security event (suspected compromise)
  • Inactivity (your policy-defined threshold)

The key is operational coupling: de-registration must be linked to HR offboarding and third-party disengagement so it is not a manual scavenger hunt.

6) Cover non-human identities explicitly

A common audit failure is treating service accounts and API keys as “not users.” For cloud services, they are access paths and need lifecycle control:

  • Registration: create service account via ticket/workflow with owner, purpose, and scope.
  • Credential management: store secrets in an approved secrets manager; rotate on change events you define.
  • De-registration: disable/delete when application is retired or owner leaves; reassign ownership if needed.

7) Require verification and reconciliation

Add a control that detects process drift:

  • Periodic reconciliation between HR/contractor rosters and active cloud identities.
  • Review of privileged groups/roles and service accounts.
  • Sampling checks: “show me the request and approval for these accounts.”

Even if provisioning is automated, reconciliation catches integration breaks, bypass accounts, and shadow admins.

8) Document exceptions and compensating controls

You will have exceptions (M&A, legacy SaaS, incident response). Create an exception workflow with:

  • Business justification
  • Risk acceptance owner
  • Compensating controls (monitoring, limited scope, time-bound access)
  • Expiration and review

Required evidence and artifacts to retain

Auditors typically ask for proof across policy, procedure, and execution. Retain:

  • Access control policy covering registration/de-registration for cloud services. 1
  • User lifecycle procedure (joiner/mover/leaver) with roles, approvals, and triggers.
  • Provisioning records: tickets/workflow logs showing request, approval, and completion.
  • Deprovisioning records: offboarding tickets, termination events, disablement logs.
  • Role/permission catalog: role definitions, approval requirements, and mappings to cloud permissions.
  • System configuration evidence: screenshots/exports showing SSO enforcement, MFA requirements if part of your standard, and IAM role structures (keep it targeted to the requirement).
  • Reconciliation reports and follow-up actions (remediation tickets).
  • Exception register for any nonstandard accounts or local users.

Tip: Evidence should be time-bound and traceable. “We have a policy” rarely passes without examples of executed records.

Common exam/audit questions and hangups

Expect questions like:

  • “Show the process for creating a new cloud admin user. Who approves it?”
  • “Pick a terminated employee. Prove their cloud access was removed.”
  • “How do you control contractor access expiry?”
  • “Do you have shared accounts? If yes, where is the exception approval?”
  • “How do you manage service accounts and API keys lifecycle?”
  • “How do you detect accounts created outside the workflow?”

Hangups that drive findings:

  • No defined owner for deprovisioning.
  • Manual steps with no retained logs.
  • Local accounts created directly in the cloud console that bypass HR/SSO.
  • No consistent link between identity records and cloud permissions.

Frequent implementation mistakes and how to avoid them

Mistake: Treating de-registration as “disable in one system.”
Avoid it by maintaining a de-registration checklist for the cloud management plane, key SaaS, CI/CD, secrets, and monitoring tools.

Mistake: Role sprawl (everyone gets “admin” to move fast).
Avoid it with a small role catalog and a privileged access approval path. Start with fewer roles and expand only when the business case is clear.

Mistake: Ignoring non-human identities.
Avoid it by requiring an owner, purpose, and retirement date (or retirement trigger) for each service account.

Mistake: No reconciliation.
Avoid it by scheduling periodic comparisons of HR/contractor rosters to active cloud identities and privileged groups, then tracking remediation.

Enforcement context and risk implications

No public enforcement sources were provided for this requirement, so this page does not list specific cases. Operationally, weak registration/de-registration increases the chance of unauthorized access through orphaned accounts, over-privileged access, and unmanaged service credentials. The business impact tends to show up as security incidents, audit findings, delayed customer due diligence, and extended incident containment time because you cannot quickly answer “who has access” and “should they still have it.”

A practical 30/60/90-day execution plan

First 30 days (stabilize and map reality)

  • Assign an accountable owner for user lifecycle in cloud services.
  • Inventory identity sources (HR, contractor lists, customer admin paths) and current cloud IAM patterns.
  • Document current joiner/mover/leaver flows, including where people bypass them.
  • Freeze uncontrolled creation of privileged accounts (require a ticket and approval while you formalize).

By 60 days (implement the formal workflow and evidence trail)

  • Publish the formal registration/de-registration procedure with clear approver roles.
  • Implement standardized access packages (roles/groups) for common job functions.
  • Connect onboarding/offboarding triggers to cloud access changes (automation where feasible, otherwise controlled tickets).
  • Define and implement service account registration and de-registration steps, including ownership tagging.

By 90 days (prove it works and close audit gaps)

  • Run a reconciliation of roster vs active identities; remediate gaps.
  • Sample test: select accounts and trace approval-to-provisioning-to-removal evidence.
  • Stand up an exception register and review cadence for any local or shared accounts.
  • Prepare an audit-ready evidence bundle (policy, procedure, samples, reconciliation outputs).

Where Daydream fits: if you need to operationalize evidence collection and keep joiner/mover/leaver records, approvals, and exceptions in one audit-friendly place across third-party and internal identities, Daydream can centralize the workflow and artifact retention without relying on scattered tickets and screenshots.

Frequently Asked Questions

Do we need a separate process for cloud services, or can we reuse our corporate joiner/mover/leaver process?

Reuse is fine if it explicitly covers cloud services and the cloud management plane. Auditors will still expect cloud-specific steps for privileged roles, service accounts, and any direct cloud-native identities.

Does this requirement apply to service accounts and API keys?

The text says “user registration and de-registration,” but in cloud operations, non-human identities function as users with access rights. Treat them as in-scope by defining how they are created, approved, owned, and retired.

What’s the minimum evidence we should keep to pass an ISO-aligned audit?

Keep the documented procedure plus a sample set of provisioning and deprovisioning records showing request, approval, and completion for real accounts. Add at least one reconciliation output and the remediation actions it generated.

We allow emergency “break-glass” access. Does that violate the requirement?

No, if it is formal: predefined conditions, controlled credentials, explicit authorization, logging, and post-use review. Document it as part of registration (who can use it) and de-registration (how access is revoked or reset after use).

Contractors and third parties are our biggest problem. How do we enforce de-registration at contract end?

Tie contractor access to a sponsor and an engagement record, then make the sponsor accountable for renewal or removal. Build a trigger for contract end dates that initiates deprovisioning and requires confirmation.

Our SaaS apps don’t integrate with SSO. How do we meet the requirement?

Run the same formal workflow through tickets or an access management tool, and retain evidence of account creation and removal. Track these apps on an exception list with compensating controls until SSO integration is available.

Footnotes

  1. ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services

Frequently Asked Questions

Do we need a separate process for cloud services, or can we reuse our corporate joiner/mover/leaver process?

Reuse is fine if it explicitly covers cloud services and the cloud management plane. Auditors will still expect cloud-specific steps for privileged roles, service accounts, and any direct cloud-native identities.

Does this requirement apply to service accounts and API keys?

The text says “user registration and de-registration,” but in cloud operations, non-human identities function as users with access rights. Treat them as in-scope by defining how they are created, approved, owned, and retired.

What’s the minimum evidence we should keep to pass an ISO-aligned audit?

Keep the documented procedure plus a sample set of provisioning and deprovisioning records showing request, approval, and completion for real accounts. Add at least one reconciliation output and the remediation actions it generated.

We allow emergency “break-glass” access. Does that violate the requirement?

No, if it is formal: predefined conditions, controlled credentials, explicit authorization, logging, and post-use review. Document it as part of registration (who can use it) and de-registration (how access is revoked or reset after use).

Contractors and third parties are our biggest problem. How do we enforce de-registration at contract end?

Tie contractor access to a sponsor and an engagement record, then make the sponsor accountable for renewal or removal. Build a trigger for contract end dates that initiates deprovisioning and requires confirmation.

Our SaaS apps don’t integrate with SSO. How do we meet the requirement?

Run the same formal workflow through tickets or an access management tool, and retain evidence of account creation and removal. Track these apps on an exception list with compensating controls until SSO integration is available.

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
ISO/IEC 27017: User registration and de-registration | Daydream