How to Audit ISO 27001 Control 8.19: Installation of Software on Operational Systems

ISO 27001 Annex A 8.19 audit checklist

Auditing ISO 27001 Annex A 8.19 Installation of Software on Operational Systems is the technical verification of administrative controls governing production environment changes. The Primary Implementation Requirement is the restriction of installation privileges and use of managed deployment tools, providing the Business Benefit of ensuring system stability and preventing unauthorised software from compromising integrity.

ISO 27001 Annex A 8.19 Installation of Software on Operational Systems Audit Checklist

This technical verification framework ensures the integrity of production environments by restricting unauthorised software modifications. Use this checklist to validate compliance with ISO 27001 Annex A 8.19.

1. Software Installation Policy Formalisation Verified

Verification Criteria: A documented policy defines the rules for installing software on operational systems, including required authorisations and technical constraints.

Required Evidence: Approved “Software Installation Policy” or “Operating System Hardening Standard” with version history.

Pass/Fail Test: If the organisation lacks a formalised mandate restricting who can install software and what types are permitted, mark as Non-Compliant.

2. Least Privilege and Administrative Right Restriction Confirmed

Verification Criteria: Technical controls restrict the ability to install software to a minimal number of authorised administrative accounts.

Required Evidence: Local Administrator group membership reports showing the exclusion of standard user accounts.

Pass/Fail Test: If a standard business user can execute an installer or bypass UAC prompts to install unapproved software, mark as Non-Compliant.

3. Use of Managed Deployment Tools Validated

Verification Criteria: Software installations are performed via centralised management tools rather than manual, ad-hoc execution on production nodes.

Required Evidence: Configuration logs from SCCM, Intune, Jamf, Ansible, or similar automated deployment platforms.

Pass/Fail Test: If the primary method for software updates on production servers is manual RDP/SSH login and file execution, mark as Non-Compliant.

4. Installation Integrity and Digital Signature Verification Confirmed

Verification Criteria: Technical mechanisms verify the authenticity and integrity of software binaries (e.g., checksums or certificates) before installation.

Required Evidence: AppLocker or Windows Defender Application Control (WDAC) logs showing “Publisher” rule enforcement.

Pass/Fail Test: If the system allows the installation of unsigned binaries or packages from unverified third-party sources, mark as Non-Compliant.

5. Operational Change Management Linkage Verified

Verification Criteria: Every software installation on an operational system is cross-referenced with a pre-approved Change Request (CR).

Required Evidence: ITSM ticket logs (e.g., Jira/ServiceNow) matched against system event logs showing the time of installation.

Pass/Fail Test: If a software package was deployed to production without a corresponding, approved Change Request, mark as Non-Compliant.

6. Rollback and Recovery Capability Validated

Verification Criteria: Procedures and technical state-captures (e.g., snapshots) exist to revert the system to a known-good state if an installation fails.

Required Evidence: Pre-deployment checklists requiring a “System Snapshot” or “Full Backup” prior to execution.

Pass/Fail Test: If the organisation cannot demonstrate a technical rollback for the last three major software deployments, mark as Non-Compliant.

7. Software Whitelisting and Blacklisting Enforcement Verified

Verification Criteria: Technical enforcement prevents the execution of unapproved or high-risk software categories (e.g., packet sniffers, hex editors).

Required Evidence: “Allow-list” configuration in the Endpoint Detection and Response (EDR) or AppLocker policy.

Pass/Fail Test: If a blacklisted utility can be executed on an operational server by an authorised admin without a specific exception, mark as Non-Compliant.

8. Inactive Account and Legacy Software Removal Confirmed

Verification Criteria: Unused or legacy software components are removed from operational systems to reduce the attack surface.

Required Evidence: Software inventory delta reports showing the decommissioning of redundant packages or “End of Life” (EOL) software.

Pass/Fail Test: If “End of Life” software remains installed on operational systems without a documented risk acceptance and compensating control, mark as Non-Compliant.

9. Audit Logging of Installation Events Verified

Verification Criteria: Success and failure of software installation events are captured in an immutable central log repository.

Required Evidence: SIEM logs showing Event IDs related to software installation (e.g., Windows Event ID 11707 or 11724).

Pass/Fail Test: If an administrator can install software and then clear the local event log to hide the action, mark as Non-Compliant.

10. Non-Production Testing Evidence Recorded

Verification Criteria: Software is tested in a segregated environment (UAT/Staging) that mirrors production before being installed on operational systems.

Required Evidence: UAT sign-off documents or testing logs identifying the specific software version and hardware compatibility.

Pass/Fail Test: If software is promoted directly to production without documented successful testing in a non-production environment, mark as Non-Compliant.

Control RequirementThe ‘Checkbox Compliance’ TrapThe Reality Check
Access RestrictionTool checks if “Software Policy” exists.Verify Group Policy. A policy PDF doesn’t stop a user; only a GPO/MDM restricting local admin rights does.
Installation IntegritySaaS tool assumes “Antivirus” is enough.Check Application Control. AV detects malware; Annex A 8.19 requires blocking unauthorised but valid software.
Managed DeploymentTool records “Intune/Jamf” is ‘Active’.Verify Exclusivity. If an admin can still install software via a .zip file or USB, the managed tool is just a suggestion.
Audit LoggingTool checks if “Logging is Enabled”.Verify Alerting. If an unapproved .exe runs on a server and the SOC doesn’t get a p1 alert, the log is forensics, not a control.
Testing EnvironmentPlatform identifies a “Staging” folder in the CMDB.Verify Parity. If Staging is Windows 2019 and Production is 2022, the “Testing” control is a technical failure.
Rollback ProofGRC tool assumes “Backups exist”.Verify Procedure. Demand the specific rollback log for the last SQL or OS update. Backups are for disasters; rollbacks are for deployments.
Legacy CleanupTool checks for “Software Inventory” once a year.Verify Vulnerabilities. If the inventory shows 10 versions of Java, the organisation is failing at software hygiene.

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top