Implementing ISO 27001 Annex A 8.20 is the process of establishing deep technical controls to secure, manage, and monitor network infrastructure. This requires enforcing strict network segregation (VLANs), “deny-all” firewall policies, and secure device hardening. The primary business benefit is minimising the attack surface and preventing unauthorised lateral movement within the corporate network.
Table of contents
- ISO 27001 Networks Security Implementation Checklist
- 1. Establish Accurate Network Topology Diagrams
- 2. Implement “Deny-All” Firewall Policies
- 3. Enforce Network Segregation (VLANs)
- 4. Harden Network Devices
- 5. Implement 802.1X Network Access Control (NAC)
- 6. Segregate Wireless Networks
- 7. Secure Remote Administrative Access
- 8. Enable and Centralise Network Logging
- 9. Filter Web Traffic and Content
- 10. Conduct Regular Firewall Rule Audits
- ISO 27001 Annex A 8.20 SaaS / GRC Platform Implementation Failure Checklist
ISO 27001 Networks Security Implementation Checklist
Use this implementation checklist to achieve compliance with ISO 27001 Annex A 8.20. This control mandates that networks are managed and controlled to protect information in systems and applications, requiring deep technical configuration rather than simple policy statements.
1. Establish Accurate Network Topology Diagrams
Control Requirement: You must possess an up-to-date visual representation of your network architecture to identify risks.
Required Implementation Step: Map your physical and logical network using tools like Nmap or automated topology mappers, ensuring every switch, router, and firewall interface is documented. Verify this diagram manually by tracing cables in the server room and auditing route tables; do not rely on static Visio diagrams created three years ago.
Minimum Requirement: A topology diagram dated within the last 90 days matching the active `arp -a` or route table output.
2. Implement “Deny-All” Firewall Policies
Control Requirement: Traffic should be blocked by default and only permitted if specifically authorised.
Required Implementation Step: Configure all perimeter and internal firewalls (including cloud Security Groups) to drop all traffic by default. Explicitly whitelist only the specific ports and protocols required for business logic (e.g., allow TCP 443, deny everything else), documenting the business justification for every open port in the rule comment field.
Minimum Requirement: The default policy on all firewall interfaces is set to DROP/DENY.
3. Enforce Network Segregation (VLANs)
Control Requirement: Different information services, users, and information systems must be segregated on networks.
Required Implementation Step: Configure Virtual LANs (VLANs) or Virtual Private Clouds (VPCs) to isolate critical infrastructure (e.g., Database Subnet) from user traffic (e.g., Wi-Fi Subnet) and public-facing services (DMZ). Implement Access Control Lists (ACLs) that strictly prevent cross-talk between these segments unless routed through a firewall for inspection.
Minimum Requirement: A user on the “Guest Wi-Fi” cannot ping the “Finance Database” server.
4. Harden Network Devices
Control Requirement: Network equipment must be configured securely to prevent unauthorised management access.
Required Implementation Step: Disable insecure management protocols (Telnet, HTTP) on all switches and routers, replacing them with SSHv2 and HTTPS. Change all default manufacturer passwords and disable discovery protocols (CDP/LLDP) on interfaces connected to untrusted networks.
Minimum Requirement: Telnet is completely disabled on all network infrastructure.
5. Implement 802.1X Network Access Control (NAC)
Control Requirement: Only authenticated and authorised devices should be allowed to connect to the network.
Required Implementation Step: Configure 802.1X port-based authentication on wired switches and wireless access points. Ensure that any device plugging into a wall port is quarantined in a “remediation VLAN” until it presents a valid machine certificate or user credential.
Minimum Requirement: Unknown devices plugging into the office LAN do not receive a routable IP address.
6. Segregate Wireless Networks
Control Requirement: Wireless networks must be treated as untrusted and strictly separated from internal resources.
Required Implementation Step: Configure Enterprise WPA3 encryption for corporate devices, authenticating against a RADIUS server. Create a completely isolated Guest SSID that routes directly to the internet with Client Isolation enabled, preventing peer-to-peer attacks.
Minimum Requirement: Guest Wi-Fi traffic never touches the internal corporate LAN.
7. Secure Remote Administrative Access
Control Requirement: Management of the network infrastructure from remote locations must be secure.
Required Implementation Step: Establish a dedicated Management VLAN or “Jump Box” for network administration. Require a VPN connection with Multi-Factor Authentication (MFA) to access this management plane; never expose switch management interfaces to the public internet.
Minimum Requirement: SSH interfaces for network devices are not reachable from the public internet.
8. Enable and Centralise Network Logging
Control Requirement: Network events must be logged to allow for forensic investigation and monitoring.
Required Implementation Step: Configure all network devices to send syslog and NetFlow/IPFIX data to a centralised SIEM or log server. Set alerts for specific indicators of compromise, such as multiple failed login attempts on a router or traffic on non-standard ports.
Minimum Requirement: Router logs are shipped off-device to a secure, immutable storage location.
9. Filter Web Traffic and Content
Control Requirement: Access to malicious external sites must be restricted.
Required Implementation Step: Deploy a DNS filter or web proxy to block access to known command-and-control (C2) domains, malware distribution sites, and phishing URLs. Ensure this filtering applies to roaming laptops via an endpoint agent, not just devices behind the office firewall.
Minimum Requirement: Attempts to resolve known malware domains are blocked at the DNS level.
10. Conduct Regular Firewall Rule Audits
Control Requirement: Firewall rules must remain relevant and necessary over time.
Required Implementation Step: Schedule a quarterly technical review of the firewall rule base. Remove “temporary” allow rules that were created for testing, prune unused object groups, and tighten “Any/Any” rules that were left wide open.
Minimum Requirement: No firewall rule exists without a documented business owner and justification.
ISO 27001 Annex A 8.20 SaaS / GRC Platform Implementation Failure Checklist
| Control Requirement | The ‘Checkbox Compliance’ Trap | The Reality Check |
|---|---|---|
| Network Diagrams | SaaS tool asks “Do you have a diagram?” (Yes/No). | You upload a diagram from 2019. Meanwhile, a rogue switch under a desk has bridged your secure VLAN to the Guest Wi-Fi. |
| Segregation | SaaS tool checks if a “Network Policy” document exists. | The policy says “We segregate,” but the Engineering and HR subnets are fully routed with no ACLs, allowing devs to read payroll files. |
| Firewall Config | SaaS tool looks for an invoice for a firewall. | The firewall is plugged in, but the rule base ends with `allow ip any any`, effectively turning it into a compliant paperweight. |
| Remote Access | SaaS tool asks “Is VPN used?”. | Users connect via VPN, but the RDP port is also open to the internet “for emergencies,” and brute-force attacks are hammering it. |
| Device Hardening | SaaS tool assumes cloud provider defaults are secure. | The core switch still has the default `cisco/cisco` credentials because nobody physically consoled in to change them. |
| Wireless Security | SaaS tool checks for a “Wi-Fi Policy”. | The “Staff” Wi-Fi password is written on a whiteboard in the reception area, visible to every delivery driver. |
| Logging | SaaS tool verifies you purchased Splunk. | Splunk is running, but the firewalls aren’t actually configured to send logs to it, so you are blind to network attacks. |
ISO 27001 Certainty™: The Ultimate ISO 27001 Certification System & Toolkit