ISO 27001 Annex A 8.21 Security of Network Services

Home / ISO 27001 Annex A Controls / ISO 27001 Annex A 8.21 Security of Network Services

What is ISO 27001 Security of Network Services?

ISO 27001 Annex A 8.21 Security of Network Services is an ISO 27001 control that requires us to secure our networks and have service levels and service requirements implemented, monitored and identified.

Purpose

ISO 27001 Annex A 8.21 is a preventive control to ensure security in the use of network services..

Definition

The ISO 27001 standard defines ISO 27001 Annex A 8.21 as:

Security mechanisms, service levels and service requirements of network services should be identified, implemented and monitored.

ISO27001:2022 Annex A 8.21 Security of Network Services

Implementation Guide

This control is looking for us to have control over our networks. We are going to ensure that we have identified what security measures we need, the service levels and the service requirements. Implementation is something that we can do internally or externally.

If external this is more about third party supplier management – see additional information:

ISO 27001 Annex A 5.19 Information Security In Supplier Relationships

ISO 27001 Annex A 5.20 Addressing Information Security Within Supplier Agreements

The standard wants us to monitor and and review the agreed service levels. A great element of the guidance is that it pushes us to consider third-party attestations to provide a demonstration that the service provider is maintaining appropriate security measures.

For me I would identify what the service requirements are then have a regular report and / or meeting that is set up to review it. I would keep evidence of this to show that I am managing it.

The are a few things to consider when it comes to what to cover so lets go through them. As we do it is worth noting that many of these are already covered and that the standard is making them specific here to networks.

Access to networks and services

For this we consider what can and should be accessed and then have appropriate policy and process in place around that access.

ISO 27001 Annex A 5.15 Access Control

ISO 27001 Annex A 5.18 Access Rights

Authentication

The requirements on authentication for accessing services should be set.

ISO 27001 Annex A 5.17 Authentication Information

Authorisation

Procedures that determine who is allowed to access networks and services are to be put in place.

ISO 27001 Annex A 5.15 Access Control

Technical Controls

The network management and technical controls as well as the processes to access connections and services will be in place.

ISO 27001 Annex A 8.20 Network Security

Access Types

How access is carried out such as physical network, wireless network, VPN will be determined.

Monitoring and Logging

Recording the time, location and other appropriate logging attributes of users that access networks and services will be in place.

ISO 27001 Annex A 8.16 Monitoring Activities

Security Features

The security features of networks will be identified and implemented as well as documented. Consider here things like encryption, connection controls, cacheing, restrictive access. Firewalls, private networks, intrusion detection are also to be considered.

Network Security Professional

All in all you should work what a network security professional to work out the best solution for you and your needs. Your requirement is to identify, document, implement, monitor and review it.

DO IT YOURSELF ISO 27001

All the templates, tools, support and knowledge you need to do it yourself.

What will an auditor check?

The audit is going to check a number of areas. Lets go through the main ones

That you have documentation

What this means is that you need to show that you have documented your network, document your security implementation and put in place appropriate service levels.

That you have have implemented Security of Network Services appropriately

They will look at systems to seek evidence of that it is implement appropriately. They will want to see evidence of the controls that in place and that they are operating. Service levels will be expected to be in place and reviewed. Where you rely on third party attestation of the supplier then evidence of that will be expected to be shown.

That you have conducted internal audits

The audit will want to see that you have tested the controls and evidenced that they are operating. This is usually in the form of the required internal audits. They will check the records and outputs of those internal audits.