Secure log-on procedures
ISO/IEC 27018 Clause 9.4.2 requires you to enforce a “secure log-on procedure” for any system or application that contains PII when your access control policy calls for it. Operationally, that means documented authentication rules (and exceptions), strong credential handling, and risk-based safeguards like MFA for PII workloads, backed by evidence you can audit.
Key takeaways:
- Treat “secure log-on” as a control set: authentication, session handling, and credential lifecycle for PII systems.
- Your access control policy is the trigger; auditors will test whether PII systems follow it consistently.
- Evidence matters: configuration proof, access logs, MFA coverage reports, and exception approvals.
“Secure log-on procedures” sounds narrow, but auditors read it as a test of whether you can reliably control access to PII systems in a public cloud. Clause 9.4.2 ties the requirement to your access control policy: if your policy says PII systems require stronger authentication, you must prove those controls exist and are enforced across the estate, not just in one flagship app.
For a Compliance Officer, CCO, or GRC lead, the fastest path is to (1) define which systems “contain PII,” (2) set a minimum secure log-on baseline in policy and standards, and (3) implement enforcement through your identity provider (IdP), single sign-on (SSO), and conditional access. Then you close the loop with monitoring: authentication logs, alerting, and periodic access reviews that demonstrate the procedure stays in place.
This page translates the clause into an implementation checklist you can hand to IAM, cloud security, and application owners, with the artifacts you should retain for audits and customer due diligence.
Regulatory text
ISO/IEC 27018:2019 Clause 9.4.2 states: “Where required by the access control policy, access to systems and applications containing PII shall be controlled by a secure log-on procedure.” 1
Operator meaning:
- You must have an access control policy that specifies log-on requirements for PII systems.
- For every in-scope system (systems/applications containing PII), you must implement and enforce a secure authentication (log-on) procedure aligned to that policy.
- You must be able to show evidence that the procedure is consistently applied, monitored, and exceptions are controlled.
Plain-English interpretation (what “secure log-on procedures” means in practice)
A secure log-on procedure is the combination of controls that make authentication resistant to common failure modes: weak passwords, credential stuffing, shared accounts, excessive session duration, and unmanaged local users. In a public-cloud PII processing context, “secure log-on” typically includes:
- Centralized authentication via SSO/IdP where feasible
- MFA for interactive access to PII systems, especially privileged access
- Strong password rules where passwords exist (length, complexity, lockout/throttling, breach checks as feasible)
- Secure session handling (timeouts, re-authentication for sensitive actions, device posture checks where applicable)
- Controlled exceptions (break-glass, service accounts, legacy protocols), documented and reviewed
Your goal is to make access to PII systems dependably attributable (who accessed), appropriately authenticated (how they proved identity), and enforceable (controls are configured, not just written).
Who it applies to
Entity scope
- Cloud Service Providers acting as PII processors that host, process, or administer systems containing customer PII in a public cloud context. 1
Operational scope (what systems and access paths are in play)
Apply secure log-on procedures to:
- Administrative access: cloud consoles, Kubernetes control planes, database admin tools, CI/CD platforms that can reach PII data stores, bastion hosts, and management APIs.
- End-user access: customer/admin portals, support consoles, internal apps used to process PII.
- Non-human access: service accounts, API keys, OAuth clients, workload identities that can access PII.
- Third-party access: consultants, support vendors, and other third parties with interactive or API access into PII environments.
A common audit hangup: teams secure the SSO login but forget direct local accounts on servers, database-native users, or “temporary” support access paths.
What you actually need to do (step-by-step)
Step 1: Define “systems containing PII” and label them
- Create an inventory of applications, databases, storage buckets, and analytics platforms that store or process PII.
- Tag these systems in CMDB/cloud tags as PII-in-scope.
- Map each system to its authentication method (SSO, local accounts, API keys, etc.).
Deliverable: a scoped list that engineering and IAM can act on, plus ownership for each system.
Step 2: Set a minimum secure log-on baseline in your access control policy
Update (or confirm) your access control policy specifies, for PII systems:
- Approved authentication mechanisms (SSO/IdP preferred; disallow local accounts except documented break-glass)
- MFA requirements (at minimum for admin and privileged access; extend to user access based on risk)
- Password requirements where passwords remain (minimum length and screening, lockout/throttling, reset process)
- Prohibited practices (shared accounts, generic admin logins, emailed passwords, plaintext storage)
- Session requirements (idle timeout, re-auth for sensitive actions, device and network conditions if used)
- Exception process (who approves, expiry, compensating controls, review cadence)
Because the clause is conditional (“where required by the access control policy”), your policy becomes the test script. If the policy is vague, audits become subjective. Make it specific enough to configure.
Step 3: Centralize log-on controls through an IdP and conditional access
- Route interactive access to PII apps through SSO where feasible.
- Enforce MFA through the IdP for:
- Privileged roles
- Admin portals
- Support access tooling
- Add conditional access rules appropriate to your environment, such as:
- Block legacy authentication protocols that bypass MFA
- Require compliant device or trusted network for admin access
- Step-up authentication for risky sign-ins
Practical tip: auditors like centralized enforcement because you can show a single configuration applies broadly, and you can generate coverage reports.
Step 4: Lock down privileged access and “break-glass”
- Identify privileged roles for PII systems (cloud admin, DB admin, app admin).
- Require MFA and strong authentication for these roles.
- Implement a break-glass process:
- Named accounts only
- Stored securely
- Access is logged and reviewed
- Time-bound enablement when possible
A frequent failure: break-glass accounts exist but no one reviews usage, so they quietly become backdoors.
Step 5: Address non-human log-ons (service accounts, API access)
Secure log-on is not only humans typing passwords. For service-to-service access to PII systems:
- Prefer managed identities/workload identity federation where available.
- Rotate secrets/keys when secrets cannot be eliminated.
- Scope credentials to least privilege and specific resources.
- Monitor for anomalous token usage and failed auth spikes.
Evidence expectation: reviewers will ask how you prevent hardcoded credentials and uncontrolled API keys from becoming the weakest “log-on” path.
Step 6: Instrument logging and detection for authentication events
- Turn on authentication logging at the IdP and on critical PII systems (where they authenticate locally).
- Send logs to a central SIEM/log platform.
- Alert on:
- Excessive failed log-ons
- Impossible travel / anomalous geo
- New device sign-ins for privileged users
- Disabled MFA, policy bypass, or conditional access failures
Even though 9.4.2 is about secure log-on, audits often expand into “show me you would detect abuse of log-on.”
Step 7: Prove it works with periodic access reviews and control testing
- Run access reviews for PII systems, including privileged roles and third-party accounts.
- Test authentication controls after major changes (IdP updates, app releases, new integrations).
- Track exceptions to closure.
Required evidence and artifacts to retain
Keep artifacts that prove both design (what you intended) and operation (what is enforced):
- Access control policy section defining secure log-on requirements for PII systems
- System inventory showing which apps/systems contain PII and their owners
- IdP/SSO configuration screenshots or exports:
- MFA enforcement policies
- Conditional access rules
- Disabled legacy auth settings (if applicable)
- Application authentication configuration records (SSO settings, local auth disabled)
- Privileged access documentation (role definitions, admin group membership rules)
- Break-glass account register, approvals, and post-use reviews
- Authentication logs (sampled) and SIEM alert rules for log-on anomalies
- Exception register with business justification, expiry, compensating controls, and approvals
- Access review outputs for in-scope systems (including third-party access)
Common exam/audit questions and hangups
Auditors and customers tend to ask:
- “Show me your access control policy requirement for secure log-on to PII systems. Where is MFA required?”
- “Which systems contain PII, and how do you know the list is complete?”
- “Do any PII systems still allow local usernames/passwords?”
- “How do you authenticate administrators and support personnel?”
- “How do third parties authenticate, and do they have individual accounts?”
- “How do you handle service accounts and API keys for PII access?”
- “Show evidence: a report of MFA coverage for the PII application fleet.”
Hangups that stall audits:
- No clean system-of-record for “PII systems”
- Mixed authentication methods without a documented rationale
- Exceptions that never expire
- Screenshots without dates, owners, or change records
Frequent implementation mistakes (and how to avoid them)
-
Writing policy that you cannot technically enforce.
Avoid: “MFA everywhere” with no rollout plan.
Do: define a baseline (privileged + PII admin paths) and expand. -
Securing the primary app login but leaving side doors open.
Avoid: SSO on the web app, local admin still enabled on the database.
Do: map every access path and remove direct auth where possible. -
Treating service accounts as exempt.
Avoid: long-lived API keys with broad access.
Do: move to workload identity or strict rotation and monitoring. -
No evidence trail.
Avoid: “Trust us, MFA is on.”
Do: maintain exports, reports, and change tickets tied to the requirement.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so treat risk through an audit and customer due diligence lens. Weak log-on controls for PII systems are a common root cause of unauthorized access: compromised credentials, overprivileged admin accounts, and unmanaged third-party access can all lead to PII exposure. Under ISO/IEC 27018 assessments, inability to show consistent secure log-on enforcement usually results in audit findings, customer friction in security reviews, and delayed onboarding for regulated customers.
Practical 30/60/90-day execution plan
First 30 days (triage and scope)
- Confirm the access control policy explicitly states secure log-on requirements for PII systems. 1
- Build an initial inventory of PII systems and identify authentication methods for each.
- Identify privileged roles and all third-party interactive access paths.
- Decide your enforcement mechanism (IdP/SSO + conditional access) and name control owners.
By 60 days (implement baseline enforcement)
- Enforce MFA for privileged access and for administrative entry points to PII systems.
- Migrate high-risk PII apps to SSO, or document compensating controls if not feasible.
- Disable shared accounts and remove unmanaged local log-ons where possible.
- Stand up an exception workflow (approvals, expiry, compensating controls) and start tracking exceptions centrally.
By 90 days (harden, monitor, and prove)
- Expand MFA/conditional access to remaining PII apps based on risk.
- Implement authentication logging aggregation and alerting for suspicious log-on activity.
- Run an access review for PII systems, including third parties and service accounts.
- Package audit-ready evidence: policy, scope list, configuration exports, and review records.
Where Daydream fits naturally: If you struggle to keep the PII system inventory, exceptions, evidence, and periodic reviews in sync across cloud teams and third parties, Daydream can act as the control hub: one place to map PII systems to required log-on controls, collect configuration proof, and track exceptions to closure.
Frequently Asked Questions
Do we have to implement MFA everywhere to meet secure log-on procedures?
The clause ties implementation to your access control policy, so auditors will test what your policy requires and whether PII systems follow it. Set a clear baseline (at minimum, privileged and admin access to PII systems) and document any exceptions.
What counts as a “system containing PII” in cloud environments?
Treat any application, database, storage, or support tool that stores, processes, or can retrieve PII as in scope. Include indirect access paths, like admin consoles, ETL pipelines, and support dashboards that can query PII.
We have legacy apps that can’t do SSO. Can we still comply?
Yes, but you need a documented exception and compensating controls that achieve secure log-on outcomes (strong authentication, controlled access, and monitoring). Auditors will expect you to show an improvement plan and tight boundaries around the legacy path.
Are service accounts and API keys part of “log-on”?
Practically, yes, because they are authentication methods that grant access to PII systems. Control them through least privilege, strong secret handling or workload identity, and monitoring for abnormal authentication behavior.
What evidence is most persuasive in audits?
Configuration exports or screenshots from your IdP showing enforced MFA and conditional access, plus an inventory of PII systems tied to those policies. Add access review results and an exception register with approvals and expirations.
How should we handle third-party access to PII systems?
Require individual accounts, enforce the same secure log-on rules (including MFA where your policy requires it), and time-bound access where possible. Track third-party access in access reviews and remove accounts promptly when engagements end.
Footnotes
Frequently Asked Questions
Do we have to implement MFA everywhere to meet secure log-on procedures?
The clause ties implementation to your access control policy, so auditors will test what your policy requires and whether PII systems follow it. Set a clear baseline (at minimum, privileged and admin access to PII systems) and document any exceptions.
What counts as a “system containing PII” in cloud environments?
Treat any application, database, storage, or support tool that stores, processes, or can retrieve PII as in scope. Include indirect access paths, like admin consoles, ETL pipelines, and support dashboards that can query PII.
We have legacy apps that can’t do SSO. Can we still comply?
Yes, but you need a documented exception and compensating controls that achieve secure log-on outcomes (strong authentication, controlled access, and monitoring). Auditors will expect you to show an improvement plan and tight boundaries around the legacy path.
Are service accounts and API keys part of “log-on”?
Practically, yes, because they are authentication methods that grant access to PII systems. Control them through least privilege, strong secret handling or workload identity, and monitoring for abnormal authentication behavior.
What evidence is most persuasive in audits?
Configuration exports or screenshots from your IdP showing enforced MFA and conditional access, plus an inventory of PII systems tied to those policies. Add access review results and an exception register with approvals and expirations.
How should we handle third-party access to PII systems?
Require individual accounts, enforce the same secure log-on rules (including MFA where your policy requires it), and time-bound access where possible. Track third-party access in access reviews and remove accounts promptly when engagements end.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream