ISO 27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles

Home / ISO 27001 Annex A Controls / ISO 27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles

ISO 27001 Secure Systems Architecture and Engineering Principles

In this ultimate guide to ISO 27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles you will learn

  • What is ISO 27001 Secure Systems Architecture and Engineering Principles 
  • An Implementation Guide
  • An Implementation Checklist
  • An Audit Checklist

I am Stuart Barker, the ISO 27001 Ninja and author of the Ultimate ISO 27001 Toolkit.

With over 30 years industry experience I will show you what’s new, give you ISO 27001 templates, show you examples, do a walkthrough and show you how to implement it for ISO 27001 certification.

What is ISO 27001 Annex A 8.27?

ISO 27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles is an ISO 27001 Annex A control that requires an organisation to design security into all architecture layers in the development lifecycle. You may hear the term – ‘security by design and default’.

Purpose

ISO 27001 Annex A 8.27 is a preventive control to ensure information systems are securely designed, implemented and operated within the development life cycle.

Definition

ISO 27001 defines ISO 27001 Annex A 8.27 as:

Principles for engineering secure systems should be established, documented, maintained and applied to any information system development activities.

ISO27001:2022 Annex A 8.27 Secure Systems Architecture and Engineering Principles

Ownership

The Information Security Officer in collaboration with the IT management team is responsible for developing, approving, and implementing appropriate engineering and architecture principles.

Changes and Differences to ISO 27002:2013

Key Secure Systems Architecture and Engineering Principles differences between ISO 27001:2013 and ISO 27001:2022

Expanded Guidance:

2022 provides more comprehensive guidance on the scope and content of secure engineering principles.
It outlines specific criteria to consider when designing these principles.

Introduction of Zero Trust:

The 2022 version incorporates the crucial concept of “zero trust,” which was not addressed in the 2013 version.

Emphasis on Secure Engineering Techniques:

2022 explicitly recommends the application of secure engineering techniques, such as “security by design,” which were not explicitly mentioned in the previous version.

These enhancements in ISO 27001:2022 reflect the evolving security landscape and emphasise the importance of a proactive and comprehensive approach to secure system development.

DO IT YOURSELF ISO 27001

All the templates, tools, support and knowledge you need to do it yourself.

Implementation Guide

Whilst I am a software engineering degree educated and time served professional, I am not in the business of telling you how to develop either systems or software. These are professions in their own right. Time has moved on. What I am going to do is show you want the ISO 27001 standard expects in the implementation for you to achieve ISO 27001 certification. These are on the whole, no brainers, common sense and what you would expect but let us take a look anyway.

Security Engineering Principles

You are going to establish, document and apply information security principles and activities. This will be designed into all architecture layers such as the business, data, application, network and technology layers.

It will include:

  • Security Controls – the full range of controls required to protect against identified threats
  • Security Events – the capability of controls to protect from, respond to and detect security events
  • Business Process Specifics – controls required by particular business controls such as digital signature, encryption or integrity checking
  • Application – where the controls are applied
  • Integration – how the controls work together

Considerations

The principles will take account of the need to integrate with a security architecture, technical architecture, capability of the organisation, costs, time, complexity and current good practices when agreeing the principles.

Techniques

Secure system engineering techniques include

  • Security architecture principles such as – least privilege, security by default, security by design, defence in depth
  • Design reviews focussed on security
  • Documentation of controls
  • Documentation of controls that do not meet requirements
  • System Hardening
  • Tamper resistance
  • Segregation
  • Secure Virtualisation

Zero Trust

Zero Trust as a principle is something you will consider and demonstrate and examples are

  • Not relying only on network perimeter security
  • Using the phrase ‘never trust always verify’ for access to information
  • Encrypting information end to end
  • Not trusting anything inside or outside a network and treating it as if it came from an open and external network
  • Using least privilege for access control
  • Authenticating and validating requests for information systems, always, based on authentication information, user identities, data classification.
  • Enforcing strong / multi factor authentication

Third party developers

This control applies in equal measure to third party developers and should be enforced via contract or legally binding agreements and alignment between the third party and the outsourced developer should be in place.

Reviews

Reviews should be in place to ensure controls and principles are appropriate and effective.

Secure Development Policy

If you are developing software then the first step is to create, or download, your secure development policy. The secure development policy set’s out what you do for information security in the context of software and systems development. It does not set out how you do it, as how you do it is covered in your processes.

The ISO 27001 Template is the quickest way to do this but you can also take a look and write it yourself.

ISO 27001 Secure Development Policy Template

For more detail on software development read –ISO 27001 Annex A 8.25 Secure Development Life Cycle. We cover it in more detail in that guide.

Conclusion

This control is very specific to those that do development and is a very technical control. You will require the input of specialist technical resources across multiple, relevant domains. The advice is to document everything.

ISO 27001 Annex A 8.27 FAQ

What is the difference between ISO 27001 Annex A 8.27 and ISO 27002 Control 8.27?

ISO 27001 Annex A 8.27 is the information security control requirement of the ISO 27001 standard for ISO 27001 certification. ISO 27002 Control 8.27 is the implementation guidance for the control.

Is Secure Systems Architecture and Engineering Principles required for ISO 27001 certification?

Yes, Secure Systems Architecture and Engineering Principles s a required information security control for ISO 27001 certification, if you develop systems.

ISO 27001 Annex A 8.27 Control and Attributes Table

Control typeInformation
security properties
Cybersecurity
concepts
Operational
capabilities
Security domains
PreventiveConfidentialityProtectApplication SecurityProtection
IntegritySystem and Network Security
Availability

ISO 27002:2022 Control 8.27

ISO 27002:2022 Control 8.27 provides implementation guidance for Secure Systems Architecture and Engineering Principles.

Further Reading

ISO 27001 Secure Systems Architecture and Engineering Principles Explained