How to Audit ISO 27001 Control 8.9: Configuration Management

ISO 27001 Annex A 8.9 audit checklist

Auditing ISO 27001 Annex A 8.9 Configuration Management is the technical verification of hardened system states and automated enforcement protocols. The Primary Implementation Requirement is the establishment of secure configuration baselines, providing the Business Benefit of preventing unauthorised changes and maintaining infrastructure integrity across the enterprise.

ISO 27001 Annex A 8.9 Configuration Management Audit Checklist

This technical verification tool is designed for lead auditors to establish the security integrity and hardening of organisational infrastructure. Use this checklist to validate compliance with ISO 27001 Annex A 8.9.

1. Standard Security Configuration Baselines Verified

Verification Criteria: Formally documented security baselines (e.g. CIS Benchmarks or vendor-specific hardening guides) exist for all hardware, software, and cloud services.

Required Evidence: Hardening standards documents or “Gold Image” configuration specifications for OS, Database, and Network tiers.

Pass/Fail Test: If the organisation cannot produce a documented baseline for its primary operating systems or cloud environments, mark as Non-Compliant.

2. Baseline Enforcement and Automation Confirmed

Verification Criteria: Technical controls or automation tools (e.g. Ansible, Terraform, Intune GPOs) are utilised to enforce and maintain the established security baselines.

Required Evidence: Configuration-as-Code (CaC) repository logs or Group Policy Object (GPO) deployment reports showing baseline enforcement.

Pass/Fail Test: If security settings are applied manually without an automated enforcement mechanism for new deployments, mark as Non-Compliant.

3. Configuration Drift Monitoring and Alerting Validated

Verification Criteria: Active monitoring is in place to detect unauthorised changes or deviations from the approved security baselines (drift).

Required Evidence: File Integrity Monitoring (FIM) logs or Cloud Security Posture Management (CSPM) alert reports for drift detection.

Pass/Fail Test: If a configuration change occurs on a production server and no alert or log entry is generated to flag the baseline deviation, mark as Non-Compliant.

4. Hardening of Default Settings Verified

Verification Criteria: All default manufacturer settings that pose a security risk (e.g. default passwords, unnecessary services, or open ports) are disabled or modified.

Required Evidence: Build checklists or server audit logs showing the removal of “root/admin” defaults and deactivation of legacy protocols (e.g. Telnet, SMBv1).

Pass/Fail Test: If a sampled production asset is found running with factory-default credentials or unneeded pre-installed services, mark as Non-Compliant.

5. Least Privilege Service Account Configuration Confirmed

Verification Criteria: Service accounts and system-to-system credentials are configured with the minimum necessary permissions required to execute their specific function.

Required Evidence: IAM permissions report for service accounts or Kubernetes Role-Based Access Control (RBAC) YAML files.

Pass/Fail Test: If service accounts are found with “Domain Admin” or “Superuser” rights when only local file access was required, mark as Non-Compliant.

6. Secure Handling of Sensitive Configuration Data Validated

Verification Criteria: Sensitive configuration information, such as API keys, secrets, and private keys, is protected using dedicated secret management tools.

Required Evidence: Configuration logs from a Secret Manager (e.g. HashiCorp Vault, AWS Secrets Manager, or Azure Key Vault).

Pass/Fail Test: If secrets or private keys are found stored in plain-text within configuration files or public code repositories, mark as Non-Compliant.

7. Configuration Change Synchronisation with Change Management Verified

Verification Criteria: All configuration changes are linked to a formal change management request and authorised prior to implementation in production.

Required Evidence: Cross-reference between a technical configuration change log and an approved Change Request (CR) ticket in the ITSM tool.

Pass/Fail Test: If a significant production configuration change was made without an associated, approved Change Request, mark as Non-Compliant.

8. Periodic Configuration Baseline Audits Recorded

Verification Criteria: Management performs periodic audits of the configuration state to verify continued alignment with the ISMS requirements.

Required Evidence: Quarterly security configuration audit reports or vulnerability scanner “compliance” reports.

Pass/Fail Test: If there is no record of a formal configuration review or compliance scan being conducted in the last 6 months, mark as Non-Compliant.

9. Backup of Master Configuration Templates Confirmed

Verification Criteria: Master configuration files, templates, and “images” are securely backed up and protected against unauthorised modification or deletion.

Required Evidence: Backup logs for the Configuration Management Database (CMDB) or immutable storage settings for “Gold Images.”

Pass/Fail Test: If the loss of a configuration management server would result in the loss of all environment blueprints, mark as Non-Compliant.

10. Software Version and Vulnerability Alignment Verified

Verification Criteria: Configuration management ensures that only approved, secure versions of software are deployed, following the patch management cycle.

Required Evidence: Software inventory list showing version parity across the environment and absence of “End of Life” (EOL) versions.

Pass/Fail Test: If the configuration management system allows the deployment of software versions with known “Critical” vulnerabilities, mark as Non-Compliant.

ISO 27001 Annex A 8.9 SaaS / GRC Platform Failure Checklist
Control Requirement The ‘Checkbox Compliance’ Trap The Reality Check
Baseline Definition Tool identifies “Hardening Policy” exists. Verify the Technical Detail. A policy is just words; the auditor must see the actual CIS level 1 or 2 mapping.
Drift Detection GRC dashboard reports “Config Management: Active”. Verify Alerting. Does the tool actually flag a change to a local firewall rule, or just say the agent is “installed”?
Secrets Protection Platform assumes “IAM” is secure. Demand the Secret Scan. Many GRC tools miss hardcoded API keys in Terraform or Ansible scripts.
Automation Tool records that “Terraform” is used. Verify Enforcement. If “Manual Changes” are allowed in the Cloud Console without being overwritten by the code, automation is failed.
Default Settings GRC tool identifies “Standard Build” is complete. Verify Real Assets. Automated reports often hide local ‘admin’ accounts that exist on the underlying hardware nodes.
Review Cycle Platform sets an “Annual Task” for review. Check the Delta. Configuration drift happens in minutes. An annual review is a “checkbox” that ignores the 364 days of risk.
Documentation Tool links to a “CMDB” spreadsheet. Verify Sync. If the spreadsheet says 100 servers but the cloud console shows 120, the configuration management is failed.

What is the objective of ISO 27001 Configuration Management?

The objective is to ensure that hardware, software, and services are configured and maintained according to documented security requirements, preventing unauthorised changes and ensuring consistent hardening levels.

How should configuration drift be monitored in a cloud environment?

Drift should be monitored using automated Cloud Security Posture Management (CSPM) tools or File Integrity Monitoring (FIM) systems that compare the live environment state against the approved “as-code” baseline.

Is automation mandatory for Annex A 8.9 compliance?

While the standard does not explicitly use the word “mandatory,” it requires effective configuration management. Given the complexity of modern systems, automation is the industry-standard method for ensuring baseline enforcement and drift detection.

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top