Skip to content

Purpose of ISO 27001:2022 Annex A 8.7

Malware is the one of the greatest menaces to business continuity and data security in the digital age.

The global business world confronts countless daily dangers from a vast array of attack vectors aiming to gain access to confidential systems and data without permission, extract data and money, deceive unsuspecting personnel and use ransomed data to demand large ransoms.

Secure malware protection should be a priority when creating an information security policy. It is essential that organisations take steps to safeguard against malicious software.

ISO 27001:2022 Annex A 8.7 outlines a range of measures to educate personnel on the risks of malicious software and implement effective preventative measures to protect against internal and external threats, thus avoiding disruption and data loss.

Ownership of Annex A 8.7

Malware protection is a broad subject, encompassing multiple business functions with varying degrees of risk and numerous ISO controls. As such, responsibility for ISO 27001:2022 Annex A 8.7 should be given to the Chief Information Security Officer, or equivalent. ICT admin staff and standard users must take practical steps to protect against malware.




ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




Guidance on ISO 27001:2022 Annex A 8.7 Compliance

Annex A 8.7 requires companies to execute a malware defence that encompasses four main aspects:

  1. Controlled systems and account access.
  2. Change management.
  3. Anti-malware software.
  4. Organisational information security awareness (user training).

ISO cautions against believing that anti-malware software is enough to provide a secure environment. ISO 27001:2022 Annex A 8.7 calls for organisations to adopt an end-to-end strategy against malware, one that begins with educating users and culminates in a secure network that minimises the possibility of intrusion from a multitude of attack sources.

Organisations should take measures to achieve their goal, including:

  • Discourage the employment of unapproved software (consult Annex A 8.19 and Annex A 8.32).
  • Stop access to malicious or unsuitable sites.
  • Reduce the number of susceptibilities existing on their network which could be taken advantage of by malware or individuals with ill intentions (observe Annex A 8.8 and Annex A 8.19).
  • Conduct frequent software assessments to detect unauthorised software, system modifications, and/or data on the network.
  • Secure data and applications with minimal risk, through internal or external acquisition.
  • Organisations should implement a malware detection policy that involves regular and comprehensive scans of all pertinent systems and files, tailored to each area’s distinct risks. A ‘defence in depth’ approach including endpoint devices and gateway controls should be adopted, accounting for numerous attack vectors (e.g. ransomware).
  • Ward off intrusions originating from emergency protocols and procedures – particularly when there is an incident or high-risk maintenance activities.
  • Draft a process that enables technical staff to deactivate some or all anti-malware efforts when they impede the organisation’s operations.
  • Implement a sturdy backup and disaster recovery (BUDR) plan that facilitates the organisation’s resumption of operations at the earliest opportunity, post disruption (see Annex A 8.13). This should comprise procedures for software that cannot be safeguarded by anti-malware software (e.g. machinery software).
  • Divide the network and/or digital and virtual working spaces into sections to prevent catastrophic damage should an attack occur.
  • Furnish all personnel with anti-malware training to raise their understanding of a large collection of topics, including (but not restricted to):
    • Email security
    • Installing malicious software
    • Social engineering
  • Gather information on the newest advancements in malware security pertaining to the industry.
  • Ensure that all notifications regarding potential malware assaults (notably from software and hardware suppliers) come from a reliable source and are precise.

Accompanying Annex A Controls

  • ISO 27001:2022 Annex A 8.13
  • ISO 27001:2022 Annex A 8.19
  • ISO 27001:2022 Annex A 8.32
  • ISO 27001:2022 Annex A 8.8



climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




Changes and Differences from ISO 27001:2013

ISO 27001:2022 Annex A 8.7 supersedes ISO 27001:2013 Annex A 12.2.1 (which addressed controls against malware).

ISO 27001:2022 Annex A 8.7 is similar to ISO 27001:2013 Annex A 12.2.1, but some of the additional advice has been given a higher priority, considering its significance for firms’ anti-malware programmes. Specifically, it includes:

  • Ensuring safety against malware during maintenance periods is essential.

ISO 27001:2013 Annex A 12.2.1 requests organisations to think about utilising two different anti-malware platforms, while ISO 27001:2022 Annex A 8.7 is content with a single integrated solution.

Table of All ISO 27001:2022 Annex A Controls

In the table below you’ll find more information on each individual ISO 27001:2022 Annex A Control.

ISO 27001:2022 Organisational Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Organisational Controls Annex A 5.1 Annex A 5.1.1
Annex A 5.1.2
Policies for Information Security
Organisational Controls Annex A 5.2 Annex A 6.1.1 Information Security Roles and Responsibilities
Organisational Controls Annex A 5.3 Annex A 6.1.2 Segregation of Duties
Organisational Controls Annex A 5.4 Annex A 7.2.1 Management Responsibilities
Organisational Controls Annex A 5.5 Annex A 6.1.3 Contact With Authorities
Organisational Controls Annex A 5.6 Annex A 6.1.4 Contact With Special Interest Groups
Organisational Controls Annex A 5.7 NEW Threat Intelligence
Organisational Controls Annex A 5.8 Annex A 6.1.5
Annex A 14.1.1
Information Security in Project Management
Organisational Controls Annex A 5.9 Annex A 8.1.1
Annex A 8.1.2
Inventory of Information and Other Associated Assets
Organisational Controls Annex A 5.10 Annex A 8.1.3
Annex A 8.2.3
Acceptable Use of Information and Other Associated Assets
Organisational Controls Annex A 5.11 Annex A 8.1.4 Return of Assets
Organisational Controls Annex A 5.12 Annex A 8.2.1 Classification of Information
Organisational Controls Annex A 5.13 Annex A 8.2.2 Labelling of Information
Organisational Controls Annex A 5.14 Annex A 13.2.1
Annex A 13.2.2
Annex A 13.2.3
Information Transfer
Organisational Controls Annex A 5.15 Annex A 9.1.1
Annex A 9.1.2
Access Control
Organisational Controls Annex A 5.16 Annex A 9.2.1 Identity Management
Organisational Controls Annex A 5.17 Annex A 9.2.4
Annex A 9.3.1
Annex A 9.4.3
Authentication Information
Organisational Controls Annex A 5.18 Annex A 9.2.2
Annex A 9.2.5
Annex A 9.2.6
Access Rights
Organisational Controls Annex A 5.19 Annex A 15.1.1 Information Security in Supplier Relationships
Organisational Controls Annex A 5.20 Annex A 15.1.2 Addressing Information Security Within Supplier Agreements
Organisational Controls Annex A 5.21 Annex A 15.1.3 Managing Information Security in the ICT Supply Chain
Organisational Controls Annex A 5.22 Annex A 15.2.1
Annex A 15.2.2
Monitoring, Review and Change Management of Supplier Services
Organisational Controls Annex A 5.23 NEW Information Security for Use of Cloud Services
Organisational Controls Annex A 5.24 Annex A 16.1.1 Information Security Incident Management Planning and Preparation
Organisational Controls Annex A 5.25 Annex A 16.1.4 Assessment and Decision on Information Security Events
Organisational Controls Annex A 5.26 Annex A 16.1.5 Response to Information Security Incidents
Organisational Controls Annex A 5.27 Annex A 16.1.6 Learning From Information Security Incidents
Organisational Controls Annex A 5.28 Annex A 16.1.7 Collection of Evidence
Organisational Controls Annex A 5.29 Annex A 17.1.1
Annex A 17.1.2
Annex A 17.1.3
Information Security During Disruption
Organisational Controls Annex A 5.30 NEW ICT Readiness for Business Continuity
Organisational Controls Annex A 5.31 Annex A 18.1.1
Annex A 18.1.5
Legal, Statutory, Regulatory and Contractual Requirements
Organisational Controls Annex A 5.32 Annex A 18.1.2 Intellectual Property Rights
Organisational Controls Annex A 5.33 Annex A 18.1.3 Protection of Records
Organisational Controls Annex A 5.34 Annex A 18.1.4 Privacy and Protection of PII
Organisational Controls Annex A 5.35 Annex A 18.2.1 Independent Review of Information Security
Organisational Controls Annex A 5.36 Annex A 18.2.2
Annex A 18.2.3
Compliance With Policies, Rules and Standards for Information Security
Organisational Controls Annex A 5.37 Annex A 12.1.1 Documented Operating Procedures
ISO 27001:2022 People Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
People Controls Annex A 6.1 Annex A 7.1.1 Screening
People Controls Annex A 6.2 Annex A 7.1.2 Terms and Conditions of Employment
People Controls Annex A 6.3 Annex A 7.2.2 Information Security Awareness, Education and Training
People Controls Annex A 6.4 Annex A 7.2.3 Disciplinary Process
People Controls Annex A 6.5 Annex A 7.3.1 Responsibilities After Termination or Change of Employment
People Controls Annex A 6.6 Annex A 13.2.4 Confidentiality or Non-Disclosure Agreements
People Controls Annex A 6.7 Annex A 6.2.2 Remote Working
People Controls Annex A 6.8 Annex A 16.1.2
Annex A 16.1.3
Information Security Event Reporting
ISO 27001:2022 Physical Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Physical Controls Annex A 7.1 Annex A 11.1.1 Physical Security Perimeters
Physical Controls Annex A 7.2 Annex A 11.1.2
Annex A 11.1.6
Physical Entry
Physical Controls Annex A 7.3 Annex A 11.1.3 Securing Offices, Rooms and Facilities
Physical Controls Annex A 7.4 NEW Physical Security Monitoring
Physical Controls Annex A 7.5 Annex A 11.1.4 Protecting Against Physical and Environmental Threats
Physical Controls Annex A 7.6 Annex A 11.1.5 Working In Secure Areas
Physical Controls Annex A 7.7 Annex A 11.2.9 Clear Desk and Clear Screen
Physical Controls Annex A 7.8 Annex A 11.2.1 Equipment Siting and Protection
Physical Controls Annex A 7.9 Annex A 11.2.6 Security of Assets Off-Premises
Physical Controls Annex A 7.10 Annex A 8.3.1
Annex A 8.3.2
Annex A 8.3.3
Annex A 11.2.5
Storage Media
Physical Controls Annex A 7.11 Annex A 11.2.2 Supporting Utilities
Physical Controls Annex A 7.12 Annex A 11.2.3 Cabling Security
Physical Controls Annex A 7.13 Annex A 11.2.4 Equipment Maintenance
Physical Controls Annex A 7.14 Annex A 11.2.7 Secure Disposal or Re-Use of Equipment
ISO 27001:2022 Technological Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Technological Controls Annex A 8.1 Annex A 6.2.1
Annex A 11.2.8
User Endpoint Devices
Technological Controls Annex A 8.2 Annex A 9.2.3 Privileged Access Rights
Technological Controls Annex A 8.3 Annex A 9.4.1 Information Access Restriction
Technological Controls Annex A 8.4 Annex A 9.4.5 Access to Source Code
Technological Controls Annex A 8.5 Annex A 9.4.2 Secure Authentication
Technological Controls Annex A 8.6 Annex A 12.1.3 Capacity Management
Technological Controls Annex A 8.7 Annex A 12.2.1 Protection Against Malware
Technological Controls Annex A 8.8 Annex A 12.6.1
Annex A 18.2.3
Management of Technical Vulnerabilities
Technological Controls Annex A 8.9 NEW Configuration Management
Technological Controls Annex A 8.10 NEW Information Deletion
Technological Controls Annex A 8.11 NEW Data Masking
Technological Controls Annex A 8.12 NEW Data Leakage Prevention
Technological Controls Annex A 8.13 Annex A 12.3.1 Information Backup
Technological Controls Annex A 8.14 Annex A 17.2.1 Redundancy of Information Processing Facilities
Technological Controls Annex A 8.15 Annex A 12.4.1
Annex A 12.4.2
Annex A 12.4.3
Logging
Technological Controls Annex A 8.16 NEW Monitoring Activities
Technological Controls Annex A 8.17 Annex A 12.4.4 Clock Synchronization
Technological Controls Annex A 8.18 Annex A 9.4.4 Use of Privileged Utility ProgramsAccess Rights
Technological Controls Annex A 8.19 Annex A 12.5.1
Annex A 12.6.2
Installation of Software on Operational Systems
Technological Controls Annex A 8.20 Annex A 13.1.1 Networks Security
Technological Controls Annex A 8.21 Annex A 13.1.2 Security of Network Services
Technological Controls Annex A 8.22 Annex A 13.1.3 Segregation of Networks
Technological Controls Annex A 8.23 NEW Web filtering
Technological Controls Annex A 8.24 Annex A 10.1.1
Annex A 10.1.2
Use of Cryptography
Technological Controls Annex A 8.25 Annex A 14.2.1 Secure Development Life Cycle
Technological Controls Annex A 8.26 Annex A 14.1.2
Annex A 14.1.3
Application Security Requirements
Technological Controls Annex A 8.27 Annex A 14.2.5 Secure System Architecture and Engineering PrinciplesLearning From Information Security Incidents
Technological Controls Annex A 8.28 NEW Secure Coding
Technological Controls Annex A 8.29 Annex A 14.2.8
Annex A 14.2.9
Security Testing in Development and Acceptance
Technological Controls Annex A 8.30 Annex A 14.2.7 Outsourced Development
Technological Controls Annex A 8.31 Annex A 12.1.4
Annex A 14.2.6
Separation of Development, Test and Production Environments
Technological Controls Annex A 8.32 Annex A 12.1.2
Annex A 14.2.2
Annex A 14.2.3
Annex A 14.2.4
Change Management
Technological Controls Annex A 8.33 Annex A 14.3.1 Test Information
Technological Controls Annex A 8.34 Annex A 12.7.1 Protection of Information Systems During Audit Testing

How ISMS.online Help

Our platform gives you customisable dashboards that grant you real-time understanding of your compliance standing.

You can oversee and control the entirety of your ISO 27001:2022 conformance from one location, including audit management, gap analysis, training management, risk assessment, and more.

This comprehensive platform offers a simple and integrated solution that can be utilised around the clock from any device connected to the internet. It facilitates a seamless and secure collaboration among employees to monitor security risks and keep track of the organisation’s progress in attaining ISO 27001:2022 certification.

Contact us now to arrange a demonstration.


Sam Peters

Sam is Chief Product Officer at ISMS.online and leads the development on all product features and functionality. Sam is an expert in many areas of compliance and works with clients on any bespoke or large-scale projects.

ISO 27001:2022 Annex A Controls

Organisational Controls