Table of contents
- ISO 27001 Secure Systems Architecture and Engineering Principles
- What is ISO 27001 Annex A 8.27?
- Purpose
- Definition
- Ownership
- Changes and Differences to ISO 27002:2013
- Implementation Guide
- Conclusion
- ISO 27001 Annex A 8.27 FAQ
- ISO 27001 Annex A 8.27 Control and Attributes Table
- ISO 27002:2022 Control 8.27
- Further Reading
ISO 27001 Secure Systems Architecture and Engineering Principles
In this ultimate guide to ISO 27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles you will learn
- What is ISO 27001 Secure Systems Architecture and Engineering Principles
- An Implementation Guide
- An Implementation Checklist
- An Audit Checklist
I am Stuart Barker, the ISO 27001 Ninja and author of the Ultimate ISO 27001 Toolkit.
With over 30 years industry experience I will show you what’s new, give you ISO 27001 templates, show you examples, do a walkthrough and show you how to implement it for ISO 27001 certification.
What is ISO 27001 Annex A 8.27?
ISO 27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles is an ISO 27001 Annex A control that requires an organisation to design security into all architecture layers in the development lifecycle. You may hear the term – ‘security by design and default’.
Purpose
ISO 27001 Annex A 8.27 is a preventive control to ensure information systems are securely designed, implemented and operated within the development life cycle.
Definition
ISO 27001 defines ISO 27001 Annex A 8.27 as:
Principles for engineering secure systems should be established, documented, maintained and applied to any information system development activities.
ISO27001:2022 Annex A 8.27 Secure Systems Architecture and Engineering Principles
Ownership
The Information Security Officer in collaboration with the IT management team is responsible for developing, approving, and implementing appropriate engineering and architecture principles.
Changes and Differences to ISO 27002:2013
Key Secure Systems Architecture and Engineering Principles differences between ISO 27001:2013 and ISO 27001:2022
Expanded Guidance:
2022 provides more comprehensive guidance on the scope and content of secure engineering principles.
It outlines specific criteria to consider when designing these principles.
Introduction of Zero Trust:
The 2022 version incorporates the crucial concept of “zero trust,” which was not addressed in the 2013 version.
Emphasis on Secure Engineering Techniques:
2022 explicitly recommends the application of secure engineering techniques, such as “security by design,” which were not explicitly mentioned in the previous version.
These enhancements in ISO 27001:2022 reflect the evolving security landscape and emphasise the importance of a proactive and comprehensive approach to secure system development.
DO IT YOURSELF ISO 27001
All the templates, tools, support and knowledge you need to do it yourself.
Implementation Guide
Whilst I am a software engineering degree educated and time served professional, I am not in the business of telling you how to develop either systems or software. These are professions in their own right. Time has moved on. What I am going to do is show you want the ISO 27001 standard expects in the implementation for you to achieve ISO 27001 certification. These are on the whole, no brainers, common sense and what you would expect but let us take a look anyway.
Security Engineering Principles
You are going to establish, document and apply information security principles and activities. This will be designed into all architecture layers such as the business, data, application, network and technology layers.
It will include:
- Security Controls – the full range of controls required to protect against identified threats
- Security Events – the capability of controls to protect from, respond to and detect security events
- Business Process Specifics – controls required by particular business controls such as digital signature, encryption or integrity checking
- Application – where the controls are applied
- Integration – how the controls work together
Considerations
The principles will take account of the need to integrate with a security architecture, technical architecture, capability of the organisation, costs, time, complexity and current good practices when agreeing the principles.
Techniques
Secure system engineering techniques include
- Security architecture principles such as – least privilege, security by default, security by design, defence in depth
- Design reviews focussed on security
- Documentation of controls
- Documentation of controls that do not meet requirements
- System Hardening
- Tamper resistance
- Segregation
- Secure Virtualisation
Zero Trust
Zero Trust as a principle is something you will consider and demonstrate and examples are
- Not relying only on network perimeter security
- Using the phrase ‘never trust always verify’ for access to information
- Encrypting information end to end
- Not trusting anything inside or outside a network and treating it as if it came from an open and external network
- Using least privilege for access control
- Authenticating and validating requests for information systems, always, based on authentication information, user identities, data classification.
- Enforcing strong / multi factor authentication
Third party developers
This control applies in equal measure to third party developers and should be enforced via contract or legally binding agreements and alignment between the third party and the outsourced developer should be in place.
Reviews
Reviews should be in place to ensure controls and principles are appropriate and effective.
Secure Development Policy
If you are developing software then the first step is to create, or download, your secure development policy. The secure development policy set’s out what you do for information security in the context of software and systems development. It does not set out how you do it, as how you do it is covered in your processes.
The ISO 27001 Template is the quickest way to do this but you can also take a look and write it yourself.
For more detail on software development read –ISO 27001 Annex A 8.25 Secure Development Life Cycle. We cover it in more detail in that guide.
Conclusion
This control is very specific to those that do development and is a very technical control. You will require the input of specialist technical resources across multiple, relevant domains. The advice is to document everything.
ISO 27001 Annex A 8.27 FAQ
ISO 27001 Annex A 8.27 is the information security control requirement of the ISO 27001 standard for ISO 27001 certification. ISO 27002 Control 8.27 is the implementation guidance for the control.
Yes, Secure Systems Architecture and Engineering Principles s a required information security control for ISO 27001 certification, if you develop systems.
ISO 27001 Annex A 8.27 Control and Attributes Table
Control type | Information security properties | Cybersecurity concepts | Operational capabilities | Security domains |
---|---|---|---|---|
Preventive | Confidentiality | Protect | Application Security | Protection |
Integrity | System and Network Security | |||
Availability |
ISO 27002:2022 Control 8.27
ISO 27002:2022 Control 8.27 provides implementation guidance for Secure Systems Architecture and Engineering Principles.
Further Reading
ISO 27001 Secure Systems Architecture and Engineering Principles Explained