Managing Privileged Access Rights
Managing Privileged Access Rights
Control Statement
The allocation and use of privileged access rights should be restricted and
managed.
Requirement
Privileged access rights refer to the level of access granted to users, software
components or services within a system, network, or application that allows
them to perform actions beyond the scope of normal/standard users. These
rights typically include permissions to access sensitive data, modify system
settings, install software, or perform other administrative tasks. Privileged
access is often granted to individuals who require elevated permissions to
carry out their job responsibilities effectively, such as system administrators,
IT support personnel, or database administrators. However, it's crucial to
carefully manage and restrict privileged access to minimize the risk of
unauthorized actions, data breaches, or malicious activities.
Implementation
Privileged access rights are access rights that allow an identity, a role or a
process to perform an activity that is not a part of normal operations but
elevated operations. Roles like system administrator, power administrator
require privileged rights. In any information system privileged access rights
enables the user to carry out system management activities, override system
or application controls.
Intentional or unintentional Inappropriate use of privileges can lead to
failures or breaches of systems and is a major contributor to disruption.
If grant of privileged access is uncontrolled then an increasing number of
users will be using the access privileges, and the implemented access controls
will be rendered pointless. The unnecessary allocation and use of privileges is
a major contributing factor to escalation of privileges. The misuse of
privileges can lead to loss of confidentiality through exposure, loss of integrity
and unavailability of services are typical consequences. cont. ….
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.2 PRIVILEGED ACCESS RIGHTS
Control Type Infosec Properties Cybersecurity Operational Security Domains
concepts capabilities
…. cont.
The first task for system owner is to identify the required privileges. Modern
systems have built in RBAC capabilities. Any assignment of privileges should
be provided on a business justification. Hence grant of any privilege should
be done via a documented Service Request. The service request should have a
justification for privileged access and approval from requestor’s manager
and the system owner. If access is granted to third-parties to whom IT
operations are outsourced partly, or fully then special care should be taken.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.2 PRIVILEGED ACCESS RIGHTS
Control Type Infosec Properties Cybersecurity Operational Security Domains
concepts capabilities
#Confidentiality #Human_resource #Governance_and
#Preventive #Integrity #Protect _security _Ecosystem
#Availability
…. cont.
The system owner before approving the request should ensure that the
requestor has necessary competence to carry out activities that require
privileged access. A record should be maintained of all users who have been
granted privileges.
A highly recommended practice is to not grant privileges to a user’s normal
day-to-day but use different ids for privileged. As an example, if an
organization uses [Link] as normal ID then they can use
firstnameadmin or superfirstname as privileged ID ensure that users are aware
of their privileged access rights and when they are in privileged access mode.
Another recommended practice is to have authentication requirements for
privileged access rights can be higher than the requirements for
normal access rights. As an example, if normal ID requires 8-character
password then privileged ID should have 14-character password.
It is also recommended to set up privileged IDs with properties like “Do not
remember passwords” and “ask every time”.
Privileged IDs should not be ideally shared. Avoid linking identities with
privileged access rights to multiple persons. If there are multiple
administrators. assigning each person a separate identity which allows
assigning specific privileged access rights. Such situations can be avoided by
using a PIM/PAM solution.
PIM/PAM solution helps to grant temporary privileged access just for the
time window necessary to implement approved changes or activities (e.g. for
maintenance activities or some critical changes), rather than
permanently granting privileged access rights. This is often referred as just-
in-time (JIT) access.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.3 INFORMATION ACCESS RESTRICTION
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Identity_and_access_man #Protection
#Integrity agement
#Availability
Control Statement
Access to information and other associated assets should be restricted in
accordance with the established topic-specific policy on access control.
Requirement
It is required that an Organization establishes an Access Control Policy. It
should determine all aspects of logical access control. The objective is to
prevent unauthorized access to information systems including business
applications.
Implementation
Every information system and business application should have an owner and
owner should determine what access rights and rules should exist for that
system. This is determined by the classification level of the information/data
contained in the system and should be in accordance with the business
requirement. For this the organization should establish and document an
access control policy (topic-specific policy) and detailed guidelines for
granting and revoking access. The policy should define who will have access,
how the access should be obtained, how access should be granted and how
level of access should be maintained.
Without a strict access control policy enforced in place there is a high
probability that users will be given access more than they require and access
to too much information or too many system privileges. The improper access
control mechanisms lead to a high risk of breach of confidentiality, loss of
integrity and loss of availability. It can also impact business in form of fraud
in financial applications or theft of intellectual property.
[Link] cont….
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.3 INFORMATION ACCESS RESTRICTION
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Identity_and_access_ #Protection
management
perform their required tasks, reducing the risk of unauthorized access and
potential security breaches.
Control Statement
Read and write access to source code, development tools and software
libraries should be appropriately managed.
Requirement
If access to program source code and libraries is not restricted and properly
controlled, then an unauthorised access either intentional or unintentional
will cause tampering of the source code leading to bugs and errors. Also, in
some cases accidental deletion can cause loss of availability. Such issues in
development environment can cause not only security issues but severely
impact the deadlines of the projects. Also if production data is used in
development environment, then confidentiality can be compromised.
Implementation
Serious security problems can arise if malicious actors gain unauthorised
access to the program source code. They can modify the source code to drop
in a vulnerability or an exploit. Source code can provide an attacker with a
perfect starting point for understanding the functionality in a system or
application. Same applies to development tools, designs, plans etc. which are a
part of software development.
Proper protection of source code needs strict and effective procedures. The
first and foremost recommendation is to isolate the source code from
production applications and data. The source code should be stored in
dedicated and isolated repositories i.e. source code management system .
A centralised repository should be preferred. These centralised source code
repositories should not reside in a production environment and not accessible
from production systems.
Further for logical access control it is advisable that users from operations or
regular users are not granted access to repositories.
cont….
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.4 ACCESS TO SOURCE CODE
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Identity_and_access_man #Protection
#Integrity agement
#Availability #Application_security
#Secure_configuration
Only authorized developers should be granted access to these that too after
proper authorization procedures.
Wherever possible direct access to source code files should be avoided and
access should be via a source code management system or developer tools
only where all activities should be logged.
Finally, an audit trail of all changes to the source code should be maintained.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.5 SECURE AUTHENTICATION
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Identity_and_access_man #Protection
#Integrity agement
#Availability
Control Statement
Secure authentication technologies and procedures should be implemented
based on information access restrictions and the topic-specific policy on
access control.
Requirement
The access-control is fundamentally AAA – Authentication, Authorization,
and Accounting. Authentication is the first requirement that means Verifying
the identity of users or entities trying to access an information system or an
information resource. These three components work together to ensure that
only authorized users can access appropriate resources, and their activities
are monitored and recorded appropriately. Secure Authentication ensures
that the user attempting to access a system, application or a resource is who
they claim to be
Implementation
A basic authentication technique that has always exist is username and
password. The username is unique to an individual or a service which
substantiates the claimed identity of a user or a service. Password is
something that is known only to the user. Passwords should not be displayed
and should not be stored or transmitted in clear text.
Now there are several alternatives to password such as smart cards, tokens,
digital keys etc.
First the organization should implement a Password Policy some aspects of
password policy include password length, age, complexity.
Earlier it was recommended to have policies like a minimum of 8 characters,
max age of 90 days, require numerals & special characters however a modern
password policy focusses on password length & not age or complexity.
Second is to implement an account lockout policy which locks out an account
after some incorrect attempts.
The password policy can be proportional to the sensitivity or classification of
the application / data to be accesses e.g. for less sensitive data we can
implement an auto unlock after 30 mins and for more sensitive data only
cont…. [Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.5 SECURE AUTHENTICATION
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Identity_and_access_man #Protection
#Integrity agement
#Availability
If possible, the last login details should be displayed however it is not always
required. It does not happen in Windows. Also, its always recommended to
have a login warning / disclaimer banner after successful login stating terms
& conditions notice warning that the system or the application or the service
should only be accessed by authorized users
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.5 SECURE AUTHENTICATION
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Identity_and_access_man #Protection
#Integrity agement
#Availability
Another aspect is that all the above policies can be made more stringent for
users with elevated privileges or super administrators.
e.g. if regular users require 8-character password, then administrators should
require 14-character passwords.
If regular accounts require 5 unsuccessful attempts, then administratrive
accounts should require 3 unsuccessful attempts.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.6 CAPACITY MANAGEMENT
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Integrity #Protect #Continuity #Protection
#Detective #Availability #Identify
#Detect
Control Statement
The use of resources should be monitored and adjusted in line with current
and expected capacity requirements.
Requirement
Any Information and Technology resources should adjust according to the
growth of organization and usage. This includes hardware resources, software
resources, licenses & subscriptions and human resources as well. To ensure
that the requirements are always met the capacity of the resources should be
proactively monitored. If resources are utilized beyond the capacity it can
lead to loss of availability also unwanted corruption of information leading to
loss of integrity. Hence resources should be tuned to maintain the system
performance. Also, projections should be made for future.
Implementation
The requirements for Information Technology are growing every day for
organizations with new technologies being introduced into business processes.
Hence the resources in information processing facilities should be sufficient to
support the growing business which includes both in terms of employees as
well as customers. If resources are inadequate, then there is a risk of loss of
availability of these services.
Hence first step is to identify the resources like hardware, software,
subscriptions, person, connectivity, power etc. Second step is to establish an
automated or manual monitoring of these resources both in terms of
availability and capacity. Availability checks if the resource is available or not
whereas capacity monitors the utilization of the resources. The capacity
monitoring helps to fine tune i.e increase the resources when required and
and helps to project future requirements with support of user planning
inputs. As example for an e-commerce company the capacity of the web-
server needs to be bumped up during discount events like black Friday. Also
the organization strategy will help to determine the projected increase in
employees then the additional hardware and software licenses requirement.
cont…. [Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.6 CAPACITY MANAGEMENT
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Integrity #Protect #Continuity #Protection
#Detective #Availability #Identify
#Detect
For hardware resource monitoring a system which monitors hardware
utilization across the Information Processing facilities should be
implemented. This helps us detecting problems in capacity to ensure
corrective action. Sudden shoot-up in CPU or Memory utilization will result
in poor performance of the services. This is true for communication networks
as well where changes in load can be sudden and lead to unproductivity.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.7 PROTECTION AGAINST MALWARE
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Integrity #Protect #System_and_network_ #Protection
#Detective #Availability #Detect security #Defence
#Corrective #Confidentiality #Information_protection
Control Statement
Protection against malware should be implemented and supported by
appropriate user awareness.
Requirement
Malware has been there as long as computers have been themselves.
Commonly referred to as “Computer Viruses” malware has evolved as much
to include worms, spyware, trojans and most devastating of them all
“ransomware”. The malware remains a threat even to the present day and
poses a danger. Organizations need to ensure that information assets are
protected against malware both for servers, endpoints and data in transit.
Implementation
All operating systems are vulnerable to malware and even operating systems
running on non-computing devices like network devices, security devices,
control systems. Though some OS are inherently more vulnerable compared
to others. Malware has been there ever since the dawn of the computers and
continues to be one of the foremost cybersecurity threats. Malware exploits
vulnerabilities and it is very easy for computers to be exploited by malware,
we have observed many malware outbreaks where a malware spread across
the globe in a matter of days faster than a pandemic. Some malware are easy
to get rid of and some can be difficult and costly to get rid of. Some malware
have a low impact like causing simply a nuisance and others can knock off
systems and steal data. With computer networks and internet connecting
billions of computers across globe malware can have a devastating impact on
confidentiality, integrity and availability.
All devices should have “Endpoint Security” installed and running including
servers, smartphones and tabs.
The “Endpoint Security” should be centrally managed and signatures should
be updated regularly.
Normal users should be prevented from making any changes to the
“Endpoint Security” settings i.e. the solution should be tamper proof.
Users should be restricted if the signatures are too outdated e.g. more than 7
days old.
A solution should be in place that scans all incoming emails (including
attachments) for malware.
A solution should be in place that scans all incoming web traffic(including
downloads) for malware at the perimeter.
For file repositories or any application with file upload a solution should be in
place that scans all files for malware during uploads.
A Defence in Depth requires that every vulnerable area should be scanned for
malware in a network gateway in various application protocols such as email,
file transfer and web.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.7 PROTECTION AGAINST MALWARE
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Integrity #Protect #System_and_network_ #Protection
#Detective #Availability #Detect security #Defence
#Corrective #Confidentiality #Information_protection
Other mechanisms other than an “endpoint security” should be implemented
Prevent installation of unauthorised software
Implement a Web Security URL filter to block malicious websites
Implement a Vulnerability Scanning solution and remediate the
vulnerabilities discovered.
Ensure that security patches are implemented timely.
Validate the software applications installed on systems periodically
Automatic scanning of external portable storage or block external portable
storage at all.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.8 MANAGEMENT OF TECHNICAL VULNERABILITIES
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Integrity #Protect #Threat_and_ #Protection
#Availability #Identify vulnerability_ #Defence
#Confidentiality management
Control Statement
Information about technical vulnerabilities of information systems in use
should be obtained, the organization’s exposure to such vulnerabilities should
be evaluated and appropriate measures should be taken.
Requirement
All kind of Software suffer from vulnerabilities including Operating Systems,
Middleware, applications and even firmware. Technical vulnerabilities are
essentially weaknesses in your computer systems that attackers can exploit to
Gain unauthorized access to your systems and data , Disrupt or disable your
computer systems or Install malware or steal sensitive information. These
vulnerabilities can arise from several factors; hence it is important to have a
knowledge of all the vulnerabilities and take all steps to prevent exploitation
of the vulnerabilities.
Implementation
Most of the attacks on organization's information systems are based on
exploitation of the vulnerabilities. Most of the dangerous global malware
outbreaks have been due to exploitation of the vulnerabilities. One of the
most notorious malware SQL Slammer worm exploited a buffer overflow
vulnerability in Microsoft SQL Server. This specific vulnerability was
released six months before the worm appeared in year 2002. In 2002
organizations didn’t focus on patching, it organizations had applied the patch
timely the worm wouldn’t have caused the havoc it did. The vulnerability was
a Buffer Overflow vulnerability in SQL Server Resolution Service.
First of all, the Organization should have an inventory of all software systems
and have procedures in place to identify the technical vulnerabilities in a
timely way. Organizations should subscribe to mailing lists from the software
vendors and cybersecurity organizations as MITRE and NIST. NIST
maintains a National Vulnerability Database (NVD) at [Link]
cont….
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.8 MANAGEMENT OF TECHNICAL VULNERABILITIES
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Integrity #Protect #Threat_and_ #Protection
#Availability #Identify vulnerability_ #Defence
#Confidentiality management
Microsoft published its vulnerabilities every second Tuesday of the month,
other software vendors similarly publish vulnerabilities monthly or quaterly.
The necessary roles and responsibilities for this process should be identified ,
if an organization has hundreds of Windows server , we may need to assign a
dedicated resources for Vulnerability fixing and patch management.
Also the vulnerability scan reports give the steps for fixing the vulnerabilities.
An audit log should be kept for all steps undertaken in technical vulnerability
management process should be regularly monitored and evaluated in order
to ensure its effectiveness and efficiency.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.9 CONFIGURATION MANAGEMENT
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Integrity #Protect #Secure_configuration #Protection
#Availability
#Confidentiality
Control Statement
Configurations, including security configurations, of hardware, software,
services and networks should be established, documented, implemented,
monitored and reviewed.
Requirement
Configuration Management is crucial for maintaining the security and
stability of IT systems. It ensures that systems are configured securely,
changes are controlled, and any deviations are identified and addressed
promptly to ensure hardware, software, services and networks function
correctly with standardized security settings, and configuration is not altered
by unauthorized or incorrect changes.
Implementation
“Configuration Management” is a new introduced in 2022 version of ISO
27001. Configuration management refers to the process of creating a set of
standardized security settings (configuration) for OS, Middleware, Network
devices etc. and controlling and managing changes to these standard
configurations.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.9 CONFIGURATION MANAGEMENT
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Integrity #Protect #Secure_configuration #Protection
#Availability
#Confidentiality
The source for developing “baseline” can be pre-defined templates from
vendors and from independent security organizations. CIS (Center for
Information Security) provides “benchmarks” for all common systems.
A Risk Management should always support the level of protection.
The third step is to ensure that a process is developed to ensure that every
IT system is implemented with the standard baseline before it is moved to
production. Implementing the “Hardening Checklist” at time of activation
should be a requirement. The activation of any new IT system should be via a
formal ‘Change Management’ process and the Change approvers should
ensure that the baseline has been implemented.
Further the baseline security configuration should not only be for newly
installed systems but for all operational production systems over their
lifetime. Further there should be periodic (half-yearly) monitoring and
verification procedures to revalidate that all the baseline settings are in place
and there has not been any deviation. This can involve using automated tools
to analyse the configuration and track any deviations from the security
baseline.
The templates should be reviewed periodically and updated when new threats
or vulnerabilities need to be addressed, or when new software or hardware
versions are introduced. Changes to configurations should follow the change
management process
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.10 INFORMATION DELETION
Control Type Infosec Properties Cybersecurity Operational Security Domains
concepts capabilities
Control Statement
Information stored in information systems, devices or in any other storage
media should be deleted when no longer required.
Requirement
Information stored in electronic or other format is always at risk of exposure,
theft or leakage leading to loss of confidentiality or integrity. Simply put “Do
not store the information if no longer required”. Information should be
securely deleted if no longer required except where it is required to meet
legal, regulatory or contractual requirements.
Implementation
8.10 is a new control introduced in 2022 version of ISO 27001. Organizations
tend to keep ‘stale’ information and ‘stale’ date stored in the information
systems endlessly unless it impacts the performance. This includes exited
employees' day to day data stored in file repositories, exited employees'
mailboxes etc. Some of the information may be sensitive in nature and
keeping this ‘stale’ information/data increases the risk of unauthorized
disclosure as it is obvious that controls may be ignored or weakened on the
stale data.
Hence it is important that organizations delete the data that is no longer
required and delete in a secure manner.
The deletion method employed should ensure complete erasure of the data
like zero-filling a HDD if to be reused or transferred, physical destruction of
HDD. The organization should take care of laws & regulations. Please note
that “formating” does not remove all data and it may be possible to recover
such data.
Have a employee exit process which includes purging of employee mailbox
and file repositories (e.g. OneDrive) if data is no longer required.
cont. ….
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.10 INFORMATION DELETION
Control Type Infosec Properties Cybersecurity Operational Security Domains
concepts capabilities
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.11 DATA MASKING.
Control Statement
Data masking should be used in accordance with the organization’s topic-
specific policy on access control and other related topic-specific policies, and
business requirements, taking applicable legislation into consideration.
Requirement
Organizations often require to share information to stakeholders or give
access to information that contains sensitive data. The sensitive data may be
PII or PHI and it needs to be protected from exposure. This may be required
as a generic security/privacy requirement or to meet legal/regulatory
standards. In such cases the information may be shared with the sensitive
contents hidden or obfuscated.
Implementation
Data Masking is a set of procedures where sensitive data is hidden or
“masked” to protect the PII or PHI. This is true in all cases where protection
of sensitive data is a requirement either statutory or legal.
These sensitive data items may require to be concealed in special cases where
data is to be shared with third-parties e.g. an organization may be required to
share data with law enforcement agencies as a part of an investigation. Many
techniques are employed to perform this data ‘masking’ like substitution
where data is replaced with random characters or obfuscation where data is
overwritten.
Further data masking can be either static or dynamic.
In ‘static’ masking the data is hidden in the original database or repository.
In ‘dynamic masking the data is not touched in its original formal but its
masked in real-time and ‘on the fly’ during access e.g. via web pages,
email, document etc.
Techniques for masking also include “Anonymization” and
“Pseudonymization” where we can use algorithms in real-time to render the
PHI/PII information in data unknown in an irreversibly way
[Anonymization] or replace the PHI/PII information in data with an alias
[Pseudonymization]. In both cases the PII/PHI information cannot be
identified.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.11 DATA MASKING.
Always keep a track and record of the sharing of the masked data.
Keep PII Principal informed and consent for data sharing even if it is
masked.
Logical Access Controls should be applied even to the masked data.
Employ methods that data is not shared further like restrictions on email
forwarding, uploading and printing.
NDAs in place even if masked data is shared which ensures sufficient
restrictions requestor's further sharing with a third-party.
A level of masking ‘strength’ i.e. obfuscation, randomization etc should be
maintained according to the sensitivity of original data and usage of
masked data i.e. reveal only the minimal ‘need-to-know’ data to the
requestor.
Restrictions which disallow all the parties from corelating the shared
masked data.
Ensure all legal, contractual, regulatory requirements override the data
sharing justification.
Employ a RBAC (Role based access control) where level of masking is
determined by the requestor’s role and PII principal’s consent.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.12 DATA LEAKAGE PREVENTION
Control Type Infosec Properties Cybersecurity Operational Security Domains
concepts capabilities
Control Statement
Data leakage prevention measures should be applied to systems, networks
and any other devices that process, store or transmit sensitive information.
Requirement
There can be intentional or unintentional leakage of data. Data leakage can
lead to loss of all confidentiality, integrity and availability. There can be
multiple sources of data leakage including endpoints, email or networks.
Hence it is important that appropriate measures are implemented at systems,
network levels that prevent leakage of data. In fact, just like intrusion
prevention , data leakage prevention is required at all levels where data is
stored, processes or transmitted.
Implementation
8.12 is a new control introduced in 2022 version of ISO 27001. Data Leakage
Prevention tools have been there for more than 15 years now however this has
been included as a dedicated control only in 2022 version of ISO 27001.
Data leakage prevention tools are designed to identify data, monitor data
usage and movement, and take actions to prevent data from leaking.
The first step is to classify the information as the leakage prevention controls
depend on the level of classification. The information should be labeled with
the classification.
Second step is to identify the channels of leakage, there can be multiple
channels of leakage as email, network, web, file repositories and attached
storage.
Third step is to implement the DLP at each channel like Email DLP, Web
DLP etc. These DLP solution can take appropriate steps depending on
classification of the information i.e blocking the user actions or network
transmissions that can expose sensitive information like quarantining email,
preventing web upload, block portable storage, block copy paste.
cont. ….
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.12 DATA LEAKAGE PREVENTION
Control Type Infosec Properties Cybersecurity Operational Security Domains
concepts capabilities
There can be data leakage via humans (i.e. social engineering), in this case
training & awareness helps.
In case the data is of highly secret nature , organizations can block basic
actions like copy-paste or taking screenshots.
It is the classification level of data and sensitivity of data that determines the
level of DLP controls.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.13 INFORMATION BACKUP
Control Type Infosec Properties Cybersecurity Operational Security Domains
concepts capabilities
Control Statement
Backup copies of information, software and systems should be maintained
and regularly tested in accordance with the agreed topic-specific policy on
backup.
Requirement
For businesses, data is often critical for operations. Accidental deletion,
hardware failure, malware attacks, or natural disasters can lead to data loss.
Loss of data can disrupt business activities, leading to financial loss, reduced
productivity, and damage to reputation. Backing up data ensures that even if
the original data is lost, a copy exists elsewhere. If data is encrypted or held
hostage by attackers, having a backup allows organizations to restore their
systems without paying ransom. Regular backups help in maintaining
business continuity by quickly restoring data after an incident. Overall, data
backup is not only important for mitigating risks but also for ensuring the
smooth functioning and resilience of businesses and individuals in the face of
various challenges.
Implementation
Information stored in digital format is always at risk of loss or corruption.
There can be partial or total loss of information and there are several threat
vectors that can cause this from malware, hardware failure to a fire or
sudden loss of utilities. In order to maintain integrity and availability of
important data the simplest control for a long time has been to make a
duplicate copy of data which is called ‘backup’.
Backup can be offline where the copy of data is made on media like tape.
[Tape based backup has been most popular since ages and Tape technology
has evolved] and the media is stored securely.
Backup can be online where a copy of data is made over a network and stored
on a different device at the same location or at an alternate location. The
alternate location should be at sufficient distance from the main site.
[Link]
cont. ….
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.13 INFORMATION BACKUP
Control Type Infosec Properties Cybersecurity Operational Security Domains
concepts capabilities
First of all, the organization should develop a Backup documented policy and
guidelines. A documented policy is to ensure that all essential information and
software can be recovered following an incident or failure or loss of server.
For offline backups care should be taken to secure media, Media should be
stored in a fireproof cabinet. For greater security backup copies should be
transported to an alternate location. The backup copies require the same of
protection as original data. Appropriate physical and environmental
protection should be ensured for storage of the backup media.
Storage media deteriorates with time hence media should be replaced timely
and disposed in a secure manner.
Also it is important to perform restoration test periodically and with rotation
of different backups. The results of all tests should be recorded. Failure to
recover data could leave the organization in breach hence restoration testing
is important. Regularly testing backup media also ensures that they can be
relied on for emergency use when necessary.
For highly confidential data it is preferred to encrypt the backups. Specially
in case of online backups it should be preferred to encrypt the backups. Also
isolate the backups virtually i.e. the backup storage should be in an isolated
VLAN which is not connected to Internet or User VLANs.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.13 INFORMATION BACKUP
Control Type Infosec Properties Cybersecurity Operational Security Domains
concepts capabilities
The backup procedures should meet the objectives of incident response plan,
business continuity plan and disaster recovery plan. The testing should ensure
that IRP, DRP and BCP requirements are met. The backup restoration testing
can be a part of IRP, DRP testing exercises.
With popularity of cloud computing , cloud backups are also popular. Users
can choose to backup on-premises information to a cloud service called BaaS
(Backup as a Service). In case of SaaS ensure that cloud provider should
ensure redundancy and as “owner” you can choose to back up the SaaS data
to an alternate cloud storage.
A related topic is archiving and retention, it is not always possible to keep all
old data online. Organizations may choose to archive the old data and archive
retention may require regulatory requirements. Archives are a form of
backup where the objective is not redundancy but retention and meeting
regulatory requirements.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.14 REDUNDANCY OF INFORMATION PROCESSING
FACILITIES
Control Type Infosec Properties Cybersecurity Operational Security Domains
concepts capabilities
Control Statement
Information processing facilities should be implemented with redundancy
sufficient to meet availability requirements.
Requirement
Information processing facilities need redundancy to ensure continuation of
operations in case of an incident. Redundancy provides fault-tolerance,
reliability, availability. Additionally, redundancy helps in performance and
scalability. Redundancy is an important aspect of Disaster-Recovery &
Business Continuity.
Implementation
Availability is a core aspect of information security, along with confidentiality
and integrity. In order to ensure availability, the first step is is to do a risk
assessment to identify the assets that need to be prioritized for continuous
availability. Depending upon the sensitivity the hardware & software need to
be architected with redundancy.
The organization has to determine if it can tolerate any loss of availability
time and data and depending on these organization needs to implement
additional measures to ensure adherence to tolerable loss.
Ensure that the redundancy systems have the same level of security as the
primary systems.
For redundancy across different locations organizations should ensure that
the data at primary location is replicated without loss to the secondary
location.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.15 LOGGING
Control Type Infosec Properties Cybersecurity Operational Security Domains
concepts capabilities
Control Statement
Logs that record activities, exceptions, faults and other relevant events should
be produced, stored, protected and analysed.
Requirement
All activities occurring on information systems, both user activities and
system activities, should be monitored and recorded by organizations. In
addition to helping administrators troubleshoot the system during an
incident, these logs also facilitate the generation of evidence and assist with
investigations when an event impacts the confidentiality, integrity, or
availability of the information system. We must ensure that logs are kept
secure, prevent unauthorized access to logs, and maintain their integrity.
When there is proper logging, we can identify what events could result in an
information security incident and affect the organization's operations. Logs
are critical for investigations / forensics if necessary.
Implementation
This control in 2022 version of ISO 27001 replaces three controls in 2013
version.
Event logs recording user activities, exceptions, faults and information
security events should be produced, kept and regularly reviewed.
Event logs recording user activities, exceptions, faults and information
security events should be produced, kept and regularly reviewed. Logging
facilities and log information should be protected against tampering and
unauthorized access.
System administrator and system operator activities should be logged and
the logs protected and regularly reviewed.
[Link]
cont. ….
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.15 LOGGING
Control Type Infosec Properties Cybersecurity Operational Security Domains
concepts capabilities
The management of logs from multiple systems can be very time consuming,
particularly in large organizations with thousands of systems. Thus, the
concept of centralized logging is essential. All logs need to be sent to a
centralized repository with strict access control. SIEM is an excellent
example of a centralized repository. A SIEM tool or equivalent service can be
utilized for storing, correlating, normalizing and analyzing log information,
as well as generating alerts. The SIEM operates as an automated system that
generates consolidated reports and alerts regarding the security of a system.
It is essential for SIEMs to have synchronized time sources as this facilitates
cross-correlation of logs between systems for analysis, alerting, and
investigation of incidents. SIEMs require careful configuration in order to
maximize their effectiveness. The SIEM should only be accessible by security
administrators, and system administrators should have limited access to
maintain the integrity of log files.
[Link]
cont. ….
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.15 LOGGING
Control Type Infosec Properties Cybersecurity Operational Security Domains
concepts capabilities
There are times when event logs may contain sensitive data and personally
identifiable information. It is very important to ensure that this information
remains private and secure by taking appropriate privacy protection
measures.
Not just logging and having the logs there is not enough it is important that
log analysis is carried out both in a proactive manner and reactive manner.
There should be people with expertise to understand and analyse the logs.
cont. ….
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.15 LOGGING
Control Type Infosec Properties Cybersecurity Operational Security Domains
concepts capabilities
When logs are properly analyzed, they are able to identify potential
incidents of information security (for example, infection of a computer with
malware or probing of a firewall) and must be subjected to further
investigation through Incident Response Plans.
When a SIEM tool is equipped with SOAR and UEBA features, most of the
tasks, such as correlating logs from multiple sources, can be automated, so
that an efficient and highly accurate analysis can be performed.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.16 MONITORING ACTIVITIES
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Detective #Integrity #Detect #Event_management #Defence
#Corrective #Availability #Respond
#Confidentiality
Control Statement
Networks, systems and applications should be monitored for anomalous
behaviour and appropriate actions taken to evaluate potential information
security incidents.
Requirement
Identifying anomalous behavior in an Information System, such as a server,
network, application, etc., can only be done by continuously monitoring it,
which is imperative to the confidentiality, integrity and availability of the
system.
The monitoring process ensures that any security events are detected at an
early stage and are prevented from escalating into a full-blown information
security incident. Monitoring detects any event that exceeds the baseline
threshold and prevents them from escalating.
Implementation
“Monitoring Activities” is a new introduced in 2022 version of ISO 27001.
Monitoring refers to the process of analysing the behavior and operation of
information systems and flag any behavior or operation that is indicative of
an attempt to compromise confidentiality, integrity and availability of the
system. Monitoring (8.16) includes Logging (8.15) and Capacity Management
as well.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.16 MONITORING ACTIVITIES
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Detective #Integrity #Detect #Event_management #Defence
#Corrective #Availability #Respond
#Confidentiality
As part of monitoring information systems, the requirements and scope
should be determined based on the business and information security
requirements (i.e. monitoring the confidentiality, integrity, availability and
privacy of information) as well as the applicable laws and regulations. It is
important to maintain monitoring records for defined retention periods.
Monitoring is not simply about security; it also helps manage and optimize
the performance of IT systems (Capacity Management). Monitoring the
performance of an organization's systems can assist in ensuring that it is
operating efficiently as well as detecting and resolving performance problems
as soon as they arise.
The monitoring of system and network activity is usually achieved with the
use of specialist software i.e. a monitoring tool, which can be configured to set
up a baseline of normal, acceptable and expected system and network
activity. It can monitor thousands of systems in real time. It uses mechanisms
like SNMP, WMI, etc to gather data. Intuitive tools can set up baselines and
flag any deviations. The tools should be able to spot deviations, network
behavior patterns, and applications behavior patterns.
A monitoring tool should have alerting mechanisms, like emails. The alerts
may need to be fine tuned with the organization's baselines and thresholds.
There should be a process in place for responding to alerts, and system
administrators should be alerted via these alerts and respond to them in a
timely manner. Identifying and addressing false positives should also be part
of the procedure, as well as tuning the monitoring software to prevent them in
the future.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.16 MONITORING ACTIVITIES
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Detective #Integrity #Detect #Event_management #Defence
#Corrective #Availability #Respond
#Confidentiality
Finally modern SIEM and monitoring tools come with machine learning and
artificial intelligence capabilities which can greatly enhance the capabilities.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.17 CLOCK SYNCHRONIZATION
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Detective #Integrity #Detect #Event_management #Defence
#Protect #Protection
Control Statement
The clocks of information processing systems used by the organization should
be synchronized to approved time sources.
Requirement
It is important to have an accurate computer clock to ensure that event logs
are accurate, because they can be used as evidence for investigations and for
legal or disciplinary actions. Inaccurate audit logs have the potential to hurt
investigations and damage credibility as well. There must be synchronization
between all information systems in order to collect, analyze, and investigate
information security events as well as to support investigations into incidents
related to information security in order to ensure the success of the
investigation.
Implementation
Despite being one of the simplest controls to implement, clock
synchronization is particularly important in terms of monitoring and incident
response. In information systems, logs are always time stamped and date
stamped. The timestamp forms an important part of the audit trail. It is
important for forensic investigations and should be consistent across all
information systems within the scope of ISMS. Using local time as the base
time should be recommended for organizations. If an organization has
locations in multiple time zones, devices should use the local time based on
their physical location; however, organizations may opt to use GMT/UTC as
the base time across the globe and then convert the time during
investigations.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.17 CLOCK SYNCHRONIZATION
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Detective #Integrity #Detect #Event_management #Defence
#Protect #Protection
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.18 USE OF PRIVILEGED UTILITY PROGRAMS
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #System_and_network_sec #Protection
#Integrity urity
#Availability #Secure_configuration
Control Statement
The use of utility programs that can be capable of overriding system and
application controls should be restricted and tightly controlled.
Requirement
The majority of information systems come with utility programs that
override system and application controls. Examples include diagnostics,
patching, antivirus, disk defragmenters, debuggers, backups, and network
tools. Some of these tools can be run without administrative privileges. These
system utilities provide an opportunity for misuse.
Implementation
It has been observed that utility programs in the majority of information
systems are designed to override the system and application controls of the
system. It is possible to run some of these system utilities without requiring
administrative privileges. Some of these tools include diagnostics, patching,
antivirus, disk defragmenters, debuggers, backups, and network tools.
System utilities such as these can be misused and damage the integrity of the
security controls on an operating system or application. The use of these
utilities may be necessary to resolve control problems in some cases, but the
use of them should be tightly controlled and should only be approved and
justified after sufficient authorization and justification have been obtained.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.18 USE OF PRIVILEGED UTILITY PROGRAMS
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #System_and_network_sec #Protection
#Integrity urity
#Availability #Secure_configuration
Ideally the use of all utility programs should be logged so that it is possible
to track their usage and accountability is ensured.
In order to ensure the best possible and secure use of utility programs, the
number of trusted authorized users must be limited to the smallest
practical number.
Programs that are restricted from being available at any time during a
period with an authorized change (e.g. for the duration of the change)
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.19 INSTALLATION OF SOFTWARE ON OPERATIONAL SYSTEMS
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity #Secure_configuration
#Availability
Control Statement
Procedures and measures should be implemented to securely manage
software installation on operational systems.
Requirement
It is important that only authorised software are permitted to be installed on
the operational systems. There exists an inherent vulnerability where users
can install unauthorised software or make unauthorised changes to the
operational software. This can result in loss of system and data integrity.
Unauthorised software can lead to possibility of fraud or even system failure.
Hence there should be strict controls against installation of software.
Implementation
This control in 2022 version replaces two controls in 2013 version
A.12.5.1 – Installation of Software on Operational Systems
A.12.6.2 – Restriction on Software Installation
This should not be limited to PCs but extended to smartphones and tablets as
well.
First organizations should have a centralized procurement of software where
all software undergoes a security testing on test system before deployment on
production systems. It should be ensured that all software procured should be
properly licensed.
Freeware and Community ware should undergo security testing as well.
The organization should define and enforce strict rules on which types of
software users can install. It is important that Organizations setup a software
‘whitelist’ – Only software in whitelist should be allowed to be installed .
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.19 INSTALLATION OF SOFTWARE ON OPERATIONAL SYSTEMS
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity #Secure_configuration
#Availability
Every organization will have groups of users with privileges that allow them
to install or alter software relevant to their positions. It is essential that these
privileges be strictly controlled and that appropriate uses be monitored.
Ensure that software patches are applied on a timely basis - these patches
resolve software bugs and vulnerabilities.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.19 INSTALLATION OF SOFTWARE ON OPERATIONAL SYSTEMS
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity #Secure_configuration
#Availability
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.20 NETWORKS SECURITY
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #System_and_network_sec #Protection
#Detective #Integrity #Detect urity
#Availability
Control Statement
Networks and network devices should be secured, managed and controlled to
protect information in systems and applications.
Requirement
Networks are one of the most important component in Information systems.
Most of the attacks involving compromise to confidentiality, integrity and
availability start with network. Hence it is very essential that network devices
and networks both LAN and WAN are secured and protected. Protection of
networks ensures protection of systems, application and data.
Implementation
Networks represent the most vulnerable part of the entire information
technology infrastructure. In terms of unauthorized access and unintentional
failures of technology, they are impaired, and their configuration can be
easily miscontrolled and protected. Furthermore, networks are particularly
prone to abuse and misuse.
Therefore, network integrity and availability may be compromised as a
result. Additionally, it is important to ensure that information that passes
over networks is secure and confidential, and to implement appropriate
controls to protect that information as well as the organization's connected
networks and systems, as well as the information that passes through them.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.20 NETWORKS SECURITY
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #System_and_network_sec #Protection
#Detective #Integrity #Detect urity
#Availability
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.21 SECURITY OF NETWORK SERVICES.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #System_and_network_sec #Protection
#Integrity urity
#Availability
Control Statement
Security mechanisms, service levels and service requirements of network
services should be identified, implemented and monitored.
Requirement
Networks are one of the most important component in Information systems
and many network related services are managed by third-party (especially
WAN services) and it's important to ensure confidentiality, integrity and
availability in acquisition, implementation and use of these services.
Implementation
Organizations depend on third-party service providers for Network Services
particularly wide-area-networks (WAN) services. Only limited organizations
with sufficient infrastructure can afford dedicated private fiber optic
connections over large distances, for remaining organizations they have to
depend on telecom service providers for wired services like MPLS, P2P,
Metro Ethernet etc. and wireless services like microwave and satellite links.
The use of third party supplied network services can increase the
opportunities for unauthorized access by other parties leading to loss of
confidentiality and integrity. Availability should also be given special
attention checking on the resilience of supplier’s failover provision in the
event of power connection or equipment failure the organization should
establish security standards that will be maintained when the supplier is
experiencing or recovering from a failure and which should identify the
security features service levels and controls required by the services being
consumed.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.21 SECURITY OF NETWORK SERVICES.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #System_and_network_sec #Protection
#Integrity urity
#Availability
The service providers can provide their security certifications like ISO 27001
to prove their security credentials and the agreements can include a ‘right to
audit’ where the organization can perform an audit on the provider. The
provider has to periodically provide evidence on how it is managing agreed
services in an secure manner ensuring confidentiality, integrity and
availability.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.22 SEGREGATION OF NETWORKS.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #System_and_network_sec #Protection
#Integrity urity
#Availability
Control Statement
Groups of information services, users and information systems should be
segregated in the organization’s networks.
Requirement
Networks are one of the most important component in Information systems
and it's important to ensure confidentiality, integrity and availability. Based
on business requirements the network should have boundaries with
controlled egress and ingress traffic with a principle of least access allowing
only necessary traffic.
Implementation
There is always a risk of unauthorized excess attempts on networks, which
could lead to loss of confidentiality and integrity for the network or the
systems attached to the network.
Creating VLANs helps manage the network easily. Security can be enhanced
by implementing internal segmentation firewalls in addition to the perimeter
firewalls which are used to segment the organizational network from the
Internet.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.22 SEGREGATION OF NETWORKS.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #System_and_network_sec #Protection
#Integrity urity
#Availability
The critical network domains e.g. the Data Center, the OT Networks should
be segregated from the general user networks for additional security using a
Core Firewall. NGFW features such as IPS (Intrusion Prevention) should be
included in Core firewalls to protect critical networks from user networks.
Wired and wireless networks should be segregated as well i.e. have different
VLANS for Wi-Fi networks. Wi-Fi networks cross physical boundaries hence
it is important to implement secure Wi-Fi access protocols like WPA2 &
WPA3 with authentication based on identities rather than a pre-shared key.
Guest networks should be isolated from other networks and should have
minimal access (Internet access only). Guest users should not be able to access
the Internal Networks. Employees should be discouraged from using Guest
Networks.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.23 WEB FILTERING.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #System_and_network_sec #Protection
#Integrity urity
#Availability
Control Statement
Access to external websites should be managed to reduce exposure to
malicious content.
Requirement
Web browsing still remains a significant source of malware and other cyber
attacks and uncontrolled/unauthorized web traffic can compromise security.
Organizations should prevent users from accessing malicious websites and
control web browsing traffic using enforced security policies
Implementation
A.8.23 is a new control introduced in ISO 27001:2022. Organizations should
control the web browsing from its networks and beyond network as well
where users use Organizational devices beyond the organizational networks.
Many websites contain unauthorised material (e.g. pirated movies/music),
illegal information (unlicensed software), unapproved content (Pornography
etc). Depending on business and information sensitivity organizations may
need to control access to Social Media, Web based free email etc as well.
The most popular solution is to use a Gateway URL Filtering solution, some
endpoint security solutions provide URL filtering capabilities as well.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.23 WEB FILTERING.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #System_and_network_sec #Protection
#Integrity urity
#Availability
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.24 USE OF CRYPTOGRAPHY.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Secure_configuration #Protection
#Integrity
#Availability
Control Statement
Rules for the effective use of cryptography, including cryptographic key
management, should be defined and implemented.
Requirement
Cryptography is employed to protect the confidentiality and integrity of
information. Both information at rest and in transit needs to be protected.
Additionally, it provides non-repudiation and authenticity. It is important
that organizations employ an effective and standardised use of cryptography.
In addition to security requirements the cryptography should consider
business requirements and regulatory requirements as well.
Implementation
This control combines two controls from 2013 version. 2013 has separate
controls on use of cryptography and management of keys. The 2022 version
combines the two controls into one.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.23 USE OF CRYPTOGRAPHY.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Secure_configuration #Protection
#Integrity
#Availability
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.25 SECURE DEVELOPMENT LIFE CYCLE.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity
#Availability
Control Statement
Rules for the secure development of software and systems should be
established and applied.
Requirement
It is important that security practices are integrated into each phase of the
SDLC irrespective of waterfall or agile methodology. Integrating security in
SDLC helps in detecting and identifying vulnerabilities early and thereby
mitigating the risks pre-production. It helps to reduce costs and improve the
overall security of the software application.
Implementation
The Software Development Life Cycle (SDLC) is a structured process used
for planning, creating, testing, and deploying software applications. It serves
as a guideline for systematic software development and aims to improve
quality and efficiency throughout the process. Various models such as
Waterfall, Agile, or DevOps, each providing different approaches to improve
flexibility, speed, or efficiency in delivering high-quality software products.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.25 SECURE DEVELOPMENT LIFE CYCLE.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity
#Availability
This control is actually an umbrella control for controls A.8.27 to A.8.32 and
the controls are detailed in detail
Secure Software Development Methodology
Secure Coding Guidelines
Security Testing including code testing and pre-deployment Pen Testing
Vulnerability Fixing
Secure Outsourced Development
Separate Test and Development Environments
Use of open source and maintaining licensing
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.25 SECURE DEVELOPMENT LIFE CYCLE.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity
#Availability
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.26 APPLICATION SECURITY REQUIREMENTS.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity #Defence
#Availability
Control Statement
Information security requirements should be identified, specified and
approved when developing or acquiring applications.
Requirement
Organizations may choose to develop bespoke applications internally
organizations may choose COTS applications and customize them. In either
case the security requirements should be identified and addressed prior the
applications are rolled out to production. The requirements should be a part
of entire acquisition and development cycles.
Implementation
This control combines and then expands two controls from ISO 27001:2013
A.14.1.2 – Securing Application services on Public Networks
A.14.1.3 – Protecting Application Services transactions
Some requirements that can be considered and according needs controls are –
Classification Level of the Information
Information contains PII or PHI
Encryption Requirements – Does application need to be encrypted
internally as well.
Requirements as per legal and regulatory standards like HIPPA , GDPR
etc.
Logging and Monitoring Requirements
Privacy Requirements
Data Protection & Data Leakage Prevention
Encryption Requirements (At Rest and In Transit)
Protection against malware and other attacks like XSS & SQL Injection
Input & Output Controls
Storage Requirements- Data Localization and Data Retention.
There can be multiple other controls that might be required. e, detailed risk
assessments and careful determination of controls are indispensable.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.27 SECURE SYSTEM ARCHITECTURE AND
ENGINEERING PRINCIPLES.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity
#Availability
Control Statement
Principles for engineering secure systems should be established, documented,
maintained and applied to any information system development activities.
Requirement
Organizations may choose to develop bespoke applications internally
organizations may choose acquiring COTS applications and customize them.
In either case these information systems should be securely designed, built,
implemented and operated during entire software development life cycle for
both acquisition and development procedures. This includes the
establishment of secure system architectures, engineering principles and
secure design practices.
Implementation
Secure system engineering principles are foundational guidelines and
practices aimed at designing, developing, and maintaining systems that are
resilient to threats, ensuring data integrity, confidentiality, and availability.
These principles help create robust systems that can withstand cyberattacks,
human errors, and system failures. 8.27 specifies that organisations must
implement secure system architecture and engineering principles to ensure
that the design, implementation and management of the information system
are appropriate to the organisation’s security requirements.
Some areas that are covered by Secure engineering principles are Identity &
Access Management, Data validation, session management etc.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.27 SECURE SYSTEM ARCHITECTURE AND
ENGINEERING PRINCIPLES.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity
#Availability
5. Secure Defaults
Ship software with secure settings enabled by default. Users should need to opt-in
for less secure configurations, not the other way around.
6. Complete Mediation
Validate every access request, ensuring that permissions are checked every time a
resource is accessed.
7. Open Design
Avoid relying on the secrecy of the system's design for security. Use proven, peer-
reviewed security algorithms and frameworks.
8. Secure Dependencies
Use trusted third-party libraries and frameworks.
Regularly audit and update dependencies to mitigate risks from known
vulnerabilities.
9. Least Common Mechanism
Minimize shared resources between components to prevent the unintended
propagation of security vulnerabilities.
10. Separation of Duties
Ensure critical processes are divided among multiple entities or components to
reduce the likelihood of fraud or abuse.
11. Secure Communication
Use encryption (e.g., TLS/SSL) for all data in transit.
Use strong encryption algorithms and ensure proper key management practices.
12. Input Validation
Validate and sanitize all user inputs to prevent injection attacks such as SQL
injection or cross-site scripting (XSS).
13. Output Encoding
Encode outputs to prevent unintended data exposure or attacks when data is
rendered in web pages or other interfaces.
14. Accountability and Auditability
Implement robust logging and monitoring systems to track user and system
actions.
Ensure logs are secure, tamper-proof, and reviewed regularly.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.27 SECURE SYSTEM ARCHITECTURE AND
ENGINEERING PRINCIPLES.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity
#Availability
15. Principle of Modularity
Design systems in modular components, making it easier to isolate, test, and
secure individual parts of the software.
16. Secure State Management
Manage states securely to prevent session hijacking, replay attacks, or other
session-based vulnerabilities.
Use techniques like tokenization and secure session cookies.
17. Resilience to Failure
Design software to gracefully handle errors and recover without exposing
sensitive information or entering insecure states.
18. Avoid Security Through Obscurity
While obscurity can be an additional layer, never rely solely on hiding system
details for security. Instead, use robust security mechanisms.
19. Proactive Updates
Plan for regular updates and patches to address vulnerabilities.
Automate testing and deployment processes for secure updates.
20. User-Centric Security
Design security features that are intuitive for users, reducing the likelihood of
misconfigurations or circumventions.
21. Continuous Security Testing
Perform regular static and dynamic code analysis, penetration testing, and fuzz
testing.
Use automated tools to identify and fix vulnerabilities during development.
22. Incident Response Planning
Include mechanisms to detect, respond to, and recover from security breaches.
Ensure clear processes for reporting vulnerabilities and incidents.
23. Secure Decommissioning
Implement secure processes for retiring or decommissioning software systems,
including data wiping and certificate revocation.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.28 SECURE CODING.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity
#Availability
Control Statement
Secure coding principles should be applied to software development.
Requirement
When an organization develops it own principle, software application it is
important that software coding is done in a secure manner so that the
vulnerabilities are mitigated in software. By adhering to secure coding
standards, developers can mitigate these risks, reducing the likelihood of
breaches. principle, ensure a reliable, safe, and trustworthy software product,
the security of that software has an important role to play, and it is directly
affected as a result.
Implementation
A.8.28 is a new control introduced in ISO 27001:2022
There is a wide range of vulnerabilities affecting software applications which
are introduced by poor design and coding. Examples of these vulnerabilities
include database injection attack and cross-site scripting attack, where
requests can be modified to take advantage of the functionality of the
software. Hence it is important that some best practices are adopted during
the software coding itself. As a best practice it is required to adopt a “zero-
trust” which has a principle of “always assume breach”. Using this principle
it is assumed that all software is inherently vulnerable to attack either
intentionally or unintentionally. Hence it is important that developers should
adopt some practices during coding to prevent these vulnerabilities and
prevent the software from tampering.
Latest industry SDLC frameworks mandate secure coding as well and code
analysis tools are available to detect if the software code has vulnerabilities.
Secure Development Lifecycle (SDLC) frameworks integrate security
practices into each phase of the software development lifecycle, ensuring
vulnerabilities are identified and addressed early.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.28 SECURE CODING.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity
#Availability
Microsoft SDL is a process that introduces security and privacy
considerations throughout all phases of development. Agile Secure
Development Lifecycle incorporates security tasks into sprints and integrates
security directly into DevOps workflows. By adopting a secure SDLC
framework, organizations can ensure that security is not an afterthought but
an integral part of the software development process.
Both NIST and ISO provide NIST Secure Software Development Framework
(SSDF) and ISO/IEC 27034 Application Security Framework that provides a
high-level approach to secure software development and provides guidelines
for incorporating security into the SDLC.
ISO 27002 mandates that secure coding practice should be used for both new
and reuse software development senarios. ISO 27002 gives some guidelines
for secure coding during SDLC cycles during planning; before coding, during
coding, during review and post deployment maintenance.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.28 SECURE CODING.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity
#Availability
Development tools should be configured to support creation of secure code
and guidance should be followed (provided by above mentioned frameworks)
to write secure code. If required, the development staff should be trained on
writing secure code and organizations should use controlled development
environments.
Developers should secure the “Source Code” and protect the same against
breach of confidentiality (unauthorized access to the code) breach of integrity
(tampering of the code). Strict version control should be maintained.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.29 SECURITY TESTING IN
DEVELOPMENT AND ACCEPTANCE.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Identify #Application_security #Protection
#Integrity #Information_security_ass
#Availability urance
Control Statement
Security testing processes should be defined and implemented in the
development life cycle.
Requirement
During the entire SDLC the security testing should be an integral part of
every stage , in addition to other testing. Before deployment in production all
security testing should be completed including code testing, application
security testing and penetration testing.
Implementation
A .8.29 control combines two controls from ISO 27001:2022 –
14.2.8 - system security testing
14.2.9 – system acceptance testing
In order to ensure that vulnerabilities and inappropriate functionality are
removed from the code as soon as possible, and not left until the end of the
software development life cycle, security testing should be conducted prior to
system deployment. Security testing should be an integral part of the testing
for systems.
As a means of identifying vulnerabilities and inappropriate functionality as
early as possible during the entire software development life cycle, systems
should be continuously tested throughout the entire software development life
cycle. A variety of test methods can be employed, including vulnerability
scanning, source code analysis, penetration testing, and manual code reviews.
These methods should be appropriate and relevant to the context of the test.
The best methodology to incorporate security testing in development life
cycle is to express them as functional / non-functional requirements.
Appropriate test plans should be developed. Testing should be proportional to
the criticality of the system. There are automated tools that can be used by
the organization in order to analyze code and identify vulnerabilities. These
tools should be used in conjunction with testing to make sure that security
related defects have been repaired.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.29 SECURITY TESTING IN
DEVELOPMENT AND ACCEPTANCE.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Identify #Application_security #Protection
#Integrity #Information_security_ass
#Availability urance
When developing major new applications, the operations function and other
relevant stakeholders should be consulted at every step to make sure the
proposed security design is actually implemented.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.29 SECURITY TESTING IN
DEVELOPMENT AND ACCEPTANCE.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Identify #Application_security #Protection
#Integrity #Information_security_ass
#Availability urance
Engaging users is important because they are responsible for making sure the
system is running securely. During testing, make sure all acceptance criteria
related to confidentiality and integrity of the information they contain are
fully satisfied. If there are any that aren't, they should be rejected.
In order to ensure that the system does not introduce vulnerabilities into the
company's environment and that testing is reliable, the test environment
should be as close as possible to the production environment in order to
ensure no vulnerabilities are introduced into the company's environment.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.30 OUTSOURCED DEVELOPMENT.
Control Statement
The organization should direct, monitor and review the activities related to
outsourced system development.
Requirement
Often organizations outsource software/application development to software
services providers. It is important that adequate information security is
incorporated in the relationship. The requirements according to
organization’s information security policy and other controls should be
implemented by the service provider in the outsourced application
development projects.
Implementation
Often organizations outsource software/application development to software
services providers. The organization should document and communicate the
information security requirements to the deponents as part of RFQs/RFPs.
The information security requirements should be agreed upon as part of legal
contracts. Organizations can develop a checklist of security cases, and the
providers should comply with the checklists. The Organization should
continually monitor and review if the requirements are being met. For long
term projects the organizations may choose a perform an ‘internal audit’ on
the providers environments. In most cases only the organizational portion of
the provider that is engaged in the deliverables is in scope, while in other
cases the entire organization may be in scope e.g. that there may be a
requirement that the provider is ISO 27001 certified, e.g. the US DOD
requires entire organization to meet CMMC requirements.
First of all the two parties should sign an NDA as part of engagement. It is
preferable to sign an NDA for each project depending on the sensitivity of the
information. Further all requirements should be agreed upon via a legal
binding.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.30 OUTSOURCED DEVELOPMENT.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.31 SEPARATION OF DEVELOPMENT, TEST AND
PRODUCTION ENVIRONMENTS.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity
#Availability
Control Statement
Development, testing and production environments should be separated and
secured.
Requirement
Production data and systems require the strictest controls. The test and
development data and systems do not require the strictest controls hence it is
recommended to separate the test and development environment from the
production environment. The production systems and data is critical and
should be protected from any test and development activities that may cause
problems and outages.
Implementation
Separating test and development from production ensures data security,
stability, compliance, and reduced risk of unintentional disruptions.
It's important that operational systems are reliable and have utmost integrity.
Using the same equipment and software to build and test new systems makes
the organization vulnerable to integrity failures and availability issues.
Development or testing of known operational software, network equipment,
or services, or cloud services carries a lot of risk. The use of errors and
omissions may result in unauthorized access, malicious code, data tampering,
and other issues related to security, which can be caused by errors or
omissions.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.31 SEPARATION OF DEVELOPMENT, TEST AND
PRODUCTION ENVIRONMENTS.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity
#Availability
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.31 SEPARATION OF DEVELOPMENT, TEST AND
PRODUCTION ENVIRONMENTS.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity
#Availability
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.32 CHANGE MANAGEMENT.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity #System_and_network_sec
#Availability urity
Control Statement
Changes to information processing facilities and information systems should
be subject to change management procedures.
Requirement
Change Management is an important component of IT IS processes. Change
Management is crucial in IT processes to ensure that changes are
systematically planned, evaluated, and implemented, minimizing disruption
to services and reducing risks to system stability and security. It is important
that security is considered in change management. Confidentiality, Integrity
and Availability is preserved during execution of changes.
Implementation
This control replaces 4 controls in 2013 version of ISO 27001.
12.1.2- Change Management
14.2.2- System change control procedures
14.2.3- Technical review of applications after operating platform changes
14.2.4- Restrictions on changes to software packages
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.32 CHANGE MANAGEMENT.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Application_security #Protection
#Integrity #System_and_network_sec
#Availability urity
disrupt business operations. In addition to installing new hardware,
deploying software, modifying a business process or operating environment,
acquiring a new cloud service, or connecting new systems to information
processing facilities, there may be problems associated with these activities.
Control Statement
Test information should be appropriately selected, protected and managed.
Requirement
It is recommended that production information should not be used for
testing. However, if a need arises organizations need to insure protection of
this data in test and development environments from breaches of
confidentiality and integrity.
Implementation
The data or information which is used for testing during the software
development process should normally be synthetic/fictitious, however many a
times there is a need where operational or production data needs to be used
for testing and generally testing can require substantial volumes of test data
that is as close as possible to production data. Whenever such a situation
arises the data which is used during testing should be appropriately
protected. As a generic practice the test environments are not controlled as
strictly as the production environment because of which there is a risk of
breach of confidentiality when the test data is being used by the software
developers and testers.
First and foremost it is recommended that production data should not be
used in test environment, the use of production data for testing should be a
last resort option. The organization is vulnerable to breaches of
confidentiality when such data is used and it should be avoided as far as
possible. If the use of production data for test cannot be avoided then it is
mandatory that the test environment/system should have the same controls to
protect the data as the production environment/system.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.33 TEST INFORMATION.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Information_protection #Protection
#Integrity
Finally, when the tests are completed and the data is no longer needed, the
data should be securely erased from the test environments and test systems.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.34 PROTECTION OF INFORMATION SYSTEMS
DURING AUDIT TESTING.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Information_protection #Protection
#Integrity #Governance_and
#Availability _Ecosystem
Control Statement
Audit tests and other assurance activities involving assessment of operational
systems should be planned and agreed between the tester and appropriate
management.
Requirement
Audits and assessments are vital to IT security and important to ISO27001.
Audits and assessments involve collection of substantial data in a short
amount of time with multiple stakeholders (including external audit parties).
It is important that there is minimal impact of internal/external audit
activities and other assessments on information systems/data and business
processes.
Implementation
Before any internal audit or external audit/assessment of information systems
takes place the audit requirements should be carefully assessed, and if an
audit is deemed required it should be carefully planned and agreed among all
the stakeholders.
[Link]
ISO 27001:2022 | ISO 27002:2022
ANNEX A CLAUSE 8.34 PROTECTION OF INFORMATION SYSTEMS
DURING AUDIT TESTING.
Control Type Infosec Cybersecurity Operational capabilities Security Domains
Properties concepts
#Preventive #Confidentiality #Protect #Information_protection #Protection
#Integrity #Governance_and
#Availability _Ecosystem
All external auditors (or audit agencies) are third-parties and there should be
legal contracts and NDAs. All third-party controls related to access-control &
data security should be followed.
All internal & external audits should have a defined and ‘agreed to’ scope.
The scope should be signed off by management. The auditee should not share
any artifacts or data from Information systems that are not in scope of the
audit.
When audit activities are completed all the necessary access given to auditors
should be revoked. All the data collected during audit should be archived.
All the audit activities should be carried out as per audit plan/workflow and
all these activities should be monitored and logged with accountability.
[Link]