Skip to content

Is Your Web Access a Gateway to Risk or a Line of Defence?

Every action taken in a browser-whether routine research or casual browsing-can open your organisation to silent threats or set off chain reactions that compromise security. ISO 27001:2022 Annex A 8.23 exists because attackers analyse these behavioural cracks, leveraging everything from seemingly harmless browser extensions to errant downloads. If your current web filtering approach relies on outdated, static policy PDFs or assumes “default is enough,” you’re operating with a false sense of security. Today, the digital frontier is defined by how actively you manage browser access, not just by the existence of a web filtering document.

One overlooked browser add-on can quietly turn a safe network into a breach vector.

Where Policies Stagnate, Risks Infiltrate

Traditional “acceptable use” statements stashed in onboarding packs might appease auditors for a moment, but attackers exploit complacency. Cyberthreats-ransomware, data leaks, credential-stealing plugins-move faster than annual policy cycles. The pace of digital risk means your web controls must be as alive as the web itself:

  • Inventory all approved browsers, plugins, and cloud platforms: to establish a living baseline.
  • Log every exception and deviation: -who, what, why, when-in your ISMS for real-time traceability.
  • Enforce recurring exception reviews: (preferably monthly), with sign-off escalation for outlier approvals.
  • Deploy visible reminders: -browser pop-ups, digital read-acknowledgement, and concise update memos-to keep security top of mind.

A passive web filtering approach quietly seeds audit gaps and exposes operational blind spots that can be exploited by anyone from opportunistic insiders to sophisticated criminal groups.

Bringing Your ISMS to Life: The Live Policy Mindset

An Information Security Management System (ISMS) should be a living record-policies versioned, exceptions timestamped, engagement digitally acknowledged. This is more than compliance theatre. It’s making defensibility routine. A read receipt for the web filtering policy, a workflow for requesting exceptions, a dashboard for open approvals and past incidents-these elements transform security from an annual checkbox to a daily, organisation-wide habit.

From Policy to Practice: Bridging Knowledge–Action Gaps

Policies written in reference-sheet Latin dont resonate. Translate web philtre guidelines into plain English for each role (sales, product, engineering, leadership). Make clear who owns which enforcement, sign-off, or monitoring task. The more transparent the responsibility, the stronger the evidence youll have when audit or incident response teams come knocking.

Book a demo


What Does ISO 27001 Annex A 8.23 Demand From Your Filtering Programme?

ISO 27001 Annex A 8.23 is unambiguous: paper compliance is nothing without real, daily evidence. Auditors and regulators look for operational proof, not just promises.

Table: Audit Evidence-Manual vs. Automated

Before the auditors arrive, assess where your own evidence programme stands:

**Evidence Type** **Audit Ready?** **Automation Level**
Versioned PDF policies Only if current Yes (ISMS or policy module)
Filtering event logs Required, recent Yes (API/log aggregator)
Exception approvals Essential Yes (workflow tool)
Archived email approvals Acceptable if linked Partial
Screenshots/screenshares Weak, non-scalable Not recommended

The organisations that thrive in audits automate as much as possible: logging, approvals, policy read receipts. Manual, ad hoc screenshots can be challenged-or dismissed outright-by auditors.

Exception Handling: Transparency Beats Suppression

In mature organisations, exceptions aren’t hidden. Every one is logged, assigned a rationale, and entered into a recurring review cycle. Each variance is a data point for improvement, not a security weakness waiting to explode. Use authenticated digital sign-off for routine cases; escalate outliers for supervisory review.

Mature organisations turn exceptions into policy improvements, not vulnerabilities.

The Encrypted Blind Spot: Filtering HTTPS Traffic

Most threats target encrypted channels (HTTPS). Effective documentation means capturing whether encrypted traffic is subject to filtering, monitoring, or exception-and proving that privacy and legal functions have sign-off on deviations. As encryption standards evolve, review exceptions with the same cadence you apply to policy updates.

Accountability Yields Audit Confidence

Naming policy owners, exception signatories, and response leads is fundamental. Ambiguity here is a red flag; clarity builds a chain of evidence that stands up under the harshest regulator questions.

When everyone knows who owns each step, no one is left scrambling when the stakes are highest.




ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




Where Filtering Goes Wrong: Common Pitfalls and Practitioner Fixes

Even strong security intentions falter due to small oversights, overreactions, or human workaround-often justified as productivity boosters but ultimately opening holes. Overly restrictive filtering breeds shadow IT; vague evidence trails can sink even earnest certification efforts.

Excessive blocking leads to shadow IT; the threat you can’t see is the one that will bite.

From Blunt Blocklists to Precision Evidence

Build an auto-updating evidence register: every policy revision, every event log, every exception rationale. This is best done within your ISMS, linked and versioned. When evidence flows seamlessly from action-rather than manual copy-and-paste-you minimise audit panic and late-night “proof hunts.”

The Evidence-Admin Barrier: How to Dissolve It

Audit defensibility comes from records that are logged, traceable, and mapped to individuals-not from email chains or static PDFs. Automate the critical steps: capture read acknowledgements, automate log exports, embed evidence prompts into daily workflows.

Exception Logging as Practice, Not Perfume

Modern, resilient teams make exception review part of their ongoing programme. Treat each closed exception not as a failure, but a learning point to evolve policy and head off future risk. This underscores that true compliance is dynamic.

Table: Blocking Approaches-Pitfalls vs. Best Practice

A visual oversight tool for leaders:

**Blocking Style** **Pitfalls** **Best Practice**
Overblocking Triggers workarounds, demoralises Moderate, adaptive; periodic feedback
Static/Best Practice Stale, prone to drift Scheduled reviews, involve key users
Underblocking Unseen threats, audit surprises Analytics-driven hindsight, proactive tune

The most adaptive programmes are not those that lock down hardest-they’re the ones that can flex to change before exposure becomes costly.




What’s the Real Risk? Breach, Fines, and Compliance Disasters

High-profile breaches often trace back to a single click or overlooked browser extension. Over 40% of significant incidents begin this way (isms.online). Failure to update or enforce controls isn’t just an inconvenience-it’s an invitation for disaster.

The most damaging incident is usually the one no one thought to log.

Legal Danger: Is Every Exception Defensible?

For legal teams, every exception is discoverable and, potentially, a liability. Unreviewed or unauthorised exceptions increase exposure to litigation and regulatory fines. The real prescription: periodic legal audits of exception logs, proactive documentation, and a defensible rationale for every deviation.

Cost of Operational Drag

Block too broadly, and you handcuff teams or delay projects. Block too little, and you risk malware, downtime, or worse. The sweet spot is found when the cost of overblocking and the risk of underblocking are both actively managed, quantified, and communicated in business terms.

Audit Trail: When and How Long?

At minimum, maintain at least 12 months of logs; highly regulated industries may require more. Don’t just store the logs-archive who did what, when, and why.

Ownership: The Final Word

Explicit sign-offs for every exception and policy change, archived digitally and readily retrievable, are required for audit fluency and true resilience.




climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




Practitioner’s Guide: Building Audit-Ready Evidence in the Flow of Work

If you wait until an audit to build evidence, you’re already too late.

The Audit-Readiness Essentials Checklist

  • Schedule quarterly archival and review of all web filtering policies.
  • Automate export and evidence capture for each blocked, allowed, or exception event.
  • Log exceptions by user, with timestamp and rationale linked in your ISMS.
  • Record all staff engagement-pop-up notices, read acknowledgements, training quiz completions.
  • Ensure chain-of-custody documentation for every policy edit, review, and approval.
  • Embed review cycles and assign them to responsible owners with escalation paths.

Ensuring Traceability: Anchor Every Action

Digital workflows and dashboards should connect the dots: who triggered an exception, who approved it, when did policy change, and what outcome did a subsequent review yield? The ability to present this lineage-user, date, rationale-is central to passing modern audits.

Legal vs. Technical Microcopy

  • Legal/Privacy Teams: “Exception rationale and authorisation are reviewed monthly. Every log is retained for one year for regulatory defensibility.”
  • IT Practitioners: “Each time you grant an exception, a rationale is permanently logged. You can pull the full history for any control at any time.”

Imagine a live dashboard showing current policy status, pending exception approvals, and engagement stats-each item clickable, each audit trail only a step away. This is audit-readiness as infrastructure, not as hope.




Balancing Security with Productivity: Finding Your Organisation’s Optimum

No team wants the legacy of a breach or the frustration of being blocked from legitimate work. Effective web filtering means adapting controls continuously-never static, never one-size-fits-all.

Making the Blocklist Dynamic

Static allowlists fail over time. Feedback-driven, quarterly (or more frequent) reviews close blind spots and ensure controls reflect the workforce’s needs and live threat intelligence. Respond to incidents not just by patching but by documenting changes and sharing rationale.

The HTTPS & Privacy Balance

Filtering encrypted (HTTPS) content walks a fine line with user privacy and legal rights. This must be documented, justified, and defended-preferably reviewed by legal or privacy teams. Communicate decisions and rationale clearly so that both security and employee expectations are met.

Effective filtering adapts-rigid controls snap, flexible ones absorb risk and change.

Agility After Incidents

Treat every post-incident review as a learning loop and document what changed. Each incident is a roadmap for system strengthening, not finger-pointing.




ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.

ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.




Architecting Automation: Resilience Built Into Your Filtering Process

Resilience and compliance in web filtering depends on two elements: motivated people and frictionless technology.

Map Controls, Assign Owners, Monitor Drift

An ISMS dashboard should map controls across browsers and services, assign explicit ownership by name, and visualise control health over time. Drift-when practice diverges from policy-must be flagged and corrected early.

Automation for Evidence and Alerts

  • Automate log aggregation, notification triggers (e.g., failed sign-offs or missing logs), and review reminders.
  • Integrate dashboards that keep all key evidence-policies, exceptions, engagement logs-visible and ready for annual or spot audits.

Picture an alert or email: “Web filtering policy updated. Please review and acknowledge.” With every click, a trained audit event is triggered, retained, and reportable.

Test Your Audit Response

Simulate an audit: can you retrieve web filtering logs, recent policy edits, and exception histories in under five minutes? If not, review and automate your evidence workflows until you reach true audit fluency-the threshold for ongoing, relaxed compliance.




Audit-Ready, Every Day: Why ISMS.online Makes Compliance Routine

Could your organisation survive a surprise audit tomorrow? With ISMS.online, every policy, approval, exception, and engagement record is live, easily accessible, and pre-mapped for audit review.

Resilience isn’t an annual project-it’s the compounding asset that turns audits from anxiety into confidence.

Compliance as Daily Rhythm

Automate policy notifications and training acknowledgements; schedule routine, cross-functional policy reviews with visible ownership. Drive defensibility through transparent processes that leave nothing to chance.

Engagement Is Proof

Trigger staff notifications, deploy micro-quizzes, or require digital sign-off for every group and role-your audit evidence isn’t just a log, it’s the record of training and real awareness across teams.

Exceptions as Value

Route exceptions up for learning and improvement, not blame. ISMS.online enables escalation to the right approver and auto-generates rationale and evidence for each event. Over time, every controlled exception sharpens your overall risk posture.

Your Next Step: From Compliance Hunt to Continuous Confidence

Stop scrambling for evidence only when prompted. Make every action audit-visible, link each proof to a business outcome, and move confidently from compliance anxiety to demonstrable, daily resilience with ISMS.online. If youre ready to see gaps, strengths, and your path to confident compliance, our team is ready to help illuminate the way.

Book a demo



Frequently Asked Questions

How does ISO 27001:2022 Annex A Control 8.23 change the status quo for web filtering?

ISO 27001:2022 Annex A 8.23 shifts web filtering from an “IT checkbox” to a live, operational discipline where every rule, exception, and business case must be justified, logged, and reviewable for audit at any time. Instead of passively relying on static blocklists or legacy web proxy settings, you are now required to show risk-based, proportionate controls that adapt to changing threats and business needs-with all decisions clearly evidenced by up-to-date records.

A web philtre that isn’t visible in practice is a risk waiting to become an audit finding.

What makes Annex A 8.23 fundamentally different?

  • Enforced Risk Logic: Decisions on what to block or allow must clearly map to actual, documented risks-not just vendor defaults.
  • Exception Management: Temporary or permanent bypasses demand written justification, approval records, and regular review cycles.
  • Real-Time Evidence: Auditors won’t accept “hope-based” policies; you need logs that prove who made a change, why, and when.
  • Staff Engagement: Employees must readily demonstrate their awareness of web use expectations, typically via signed policy acknowledgements or digital training receipts.

Approaching web filtering as a living process, rather than a static setup, dramatically improves resilience and makes audit conversations about continuous protection-not about cleaning up old mistakes.


What business and security risks appear when web filtering is neglected or superficial?

When web filtering is seen as a background IT task rather than an accountable business control, exposure grows silent-until an attack or audit lays it bare. Loopholes, unreviewed exceptions, or a “set-and-forget” mentality let threats slip through the cracks, while overblocking key resources causes workarounds that break both productivity and policy.

How do undermanaged web philtres actually harm business?

  • Uncontrolled Browser Extensions: Staff bypass or “whitelist” themselves around controls, sometimes installing risky plugins that syphon data or introduce malware.
  • Audit-Ready Gaps: A random check by a regulator or auditor may expose missing exception logs, a stale approval trail, or outdated rationale-leading to fines, deal delays, or remediation orders (ENISA, 2024).
  • Policy Fatigue and Cultural Erosion: When staff see filtering as arbitrary or out of sync with real work, they disengage, sparking further circumvention.
Risk Vector Failure Mode Business Impact
Malware via bad sites Outdated philtres Ransomware, breach, operational loss
Regulatory non-compliance No log of exception/approval Fines, lost contract, required re-audits
Productivity drag Essential sites wrongly blocked User downtime, support tickets, slowdowns
Brand harm Data exfiltration or outage Customer churn, negative press, lost trust

Lack of evidence is as grave a risk as lack of control-if you can't show what happened, you may as well have missed it.


What proof and procedures do auditors want under Annex A 8.23?

Modern audits expect you to show your web filtering control “in action,” not in theory. This means rapidly retrievable logs showing every key control point-what was blocked, who requested an exception, who approved, and when it was last reviewed. Staff must be able to explain their responsibilities, and processes have to include clear escalation and closure for exceptions.

What does ready-for-audit evidence look like?

  • Versioned Policy Logs: Every rule update or exception carries a date, rationale, and named approver.
  • Exception Workflow Records: Temporary unblockings log both the business justification and a scheduled revisit-automated, not just best-effort.
  • Staff Acknowledgement: Digital sign-offs or completion records for web-use training or policy refreshers.
  • Respond-to-Request Capability: You must be able to export logs or reports covering any requested month within a year (commonly), sorted and filtered to show action and review.

An auditor may request three months of logs, a record for one exception, and confirmation that users were aware of the process. If this takes longer than 10-15 minutes, or if you need to manually collate disparate sources, your controls need tightening before your next review window.


How do you balance strict web controls with business productivity-and prevent resistance or workarounds?

Effective filtering is built on proportionality and user buy-in: controls strong enough to cover true risks but flexible enough so staff aren’t forced into creative, unsanctioned workarounds. ISO 27001:2022 explicitly encourages adaptability, but it also demands you show how business needs are weighed and exceptions are not “forever.”

Which best practices keep filtering both strong and friction-free?

  • Periodic User Pulse Surveys: Proactively ask teams which blocks create friction, and correct misalignments before complaints escalate.
  • Smart, Tracked Exceptions: Use time-limited unblockings, clearly documented and then expired or reviewed-avoid “set it and forget it.”
  • Staged Pilots: Trial new policies or categories with select groups; gather impact data before rolling out platform-wide.
  • Alert Rationalisation: Cut noise by focusing alerts on actionable events, so staff and IT are not numbed by excess notifications.
Step in Exception Workflow Control Purpose
Log all exceptions Evidence, accountability
Assign business approver Risk alignment, not just IT bias
Set auto-review/expiry Prevent permanent unwatched holes
Review and close timely Shrink the attack and audit window

Staff who feel heard and supported are your first compliance allies-while the unheard become creative rule-benders.


What legal and multi-standard compliance must web filtering evidence now satisfy?

Web filtering is not just a technical philtre-it must satisfy privacy, recordkeeping, and fast-escalation demands from regulators and customers. Each bypass or policy update potentially touches personal data, triggers privacy review, or must stand scrutiny from multiple frameworks.

How do you design defensible, standards-aligned filtering?

  • Maintain Export-Grade Logs: Regulations increasingly demand logs with business rationale, personal data impact checks, and clear retention policies-12 months is a typical benchmark.
  • Document Privacy Impacts for Inspection: Where web monitoring examines user content or crosses regions (GDPR, CCPA), maintain signed privacy impact assessments and records of legal review.
  • Cross-Map Evidence: Keep a register showing how each filtering rule, exception, or log serves multiple obligations (ISO 27001, NIS 2, SOC 2, GDPR) to reduce duplication and avoid gaps.
Regimes Core Proof Requirements Filtering Evidence Example
ISO 27001 Reasoned, logged control Policy, logs, exception reviews
GDPR/CCPA Proportional, privacy assessed Impact assessment, consent
NIS 2 24/72h alert & response Escalation logs, policy reviews
SOC 2 Operational oversight Audit exports, user training

Laws and frameworks increasingly align: what suffices for ISO 27001 will often need only minor tweaks-a central advantage of structured platforms like ISMS.online.


How does ISMS.online turn Annex A 8.23 controls into everyday assurance?

ISMS.online equips your organisation with pre-built, customizable filtering policies, automated approval and evidence workflows, staff engagement records, and real-time audit exports. Instead of scrambling at audit time or improvising exception tracking, you work in a system where every web filtering action is mapped, monitored, and centrally visible.

What features make ISMS.online unique for web filtering compliance?

  • Policy Templates and Fast Setup: Pre-made rules structure your filtering programme from day one; customise as risks or business needs shift.
  • Integrated Exception Handling: Every bypass triggers a review, log entry, and scheduled revisit-no lost emails, expired patches, or manual chasing.
  • Automated Evidence Record Creation: Every staff sign-off, policy update, or audit challenge is documented instantly; reports are ready in seconds, not weeks.
  • Framework Connection: One dashboard tracks which actions, approvals, and records support ISO 27001, NIS 2, GDPR/CCPA, and SOC 2 at once-radically easing multi-standard audits.
  • Live Review and Export: No more last-minute reconciliations-generate the exact logs or policy trails required for customer security questionnaires, board reviews, or external audits.

With ISMS.online, web filtering isn’t an afterthought-it’s operationalized assurance you can trust when the spotlight comes.

By transforming compliance from a burdensome after-the-fact exercise into an everyday workflow, you safeguard your business, stand ready for any auditor or customer requirement, and build a stronger security culture-all without sacrificing speed or staff goodwill.



Mark Sharron

Mark Sharron leads Search & Generative AI Strategy at ISMS.online. His focus is communicating how ISO 27001, ISO 42001 and SOC 2 work in practice - tying risk to controls, policies and evidence with audit-ready traceability. Mark partners with product and customer teams so this logic is embedded in workflows and web content - helping organisations understand, prove security, privacy and AI governance with confidence.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on mint

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Spring 2026
High Performer - Spring 2026 Small Business UK
Regional Leader - Spring 2026 EU
Regional Leader - Spring 2026 EMEA
Regional Leader - Spring 2026 UK
High Performer - Spring 2026 Mid-Market EMEA

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.