ISO 27001 Annex A Control 8.20

ISO 27001 control 8.20 Networks security

The basics

ISO 27001 control A.8.20 Networks security requires companies to handle networks and network devices in order to protect information that flows through them. This is important because if the network is compromised, the attacker will find it much easier to access sensitive information and other assets on the network.

Documentation

ISO 27001 control A.8.20 Networks security can be documented:

These documents are not mandatory, but are recommended.

Implementation

In order to comply with control A.8.20 Networks security you might implement the following:

  • Technology — the technology to enable secure networks could include software (e.g., authentication software, logging and monitoring tools, SSL, VPN, etc.) and hardware (e.g., devices like routers, firewalls, etc.).
  • Organization/processes — you should set up a process for defining responsibilities and procedures for the management of network equipment, what needs to be monitored and monitored, how, and by whom. You can document those processes through Security Procedures for IT Department or a Network Security Procedure.
  • People — make employees aware of the risks of insecure networks, and train IT staff on how to properly apply secure network configurations and monitor network performance.

Audit evidence

During the certification audit, the auditor might look for the following evidence regarding control A.8.20 Networks security: if networks and network devices are handled properly to protect information that flows through them.