Purpose of Control 8.21
In computing, a ‘network service’ can broadly be described as a system running on the ‘network application layer’, such as e-mail, printing, or a file server. Network services also include managed applications and security solutions such as firewalls or gateway antivirus platforms, intrusion detection systems and connection services.
Network services often represent the most important functional parts of a network, and are critical to the day-to-day operation of a modern commercial ICT network. Security is therefore paramount, and the use of network services needs to be closely monitored and directly managed to minimise the associated risk of failure, intrusion and business disruption.
Attributes Table of Control 8.21
Control 8.21 is a preventive control that maintains risk by establishing a set of rules that govern the use of both network services and, by association, the host network itself.
Control Type | Information Security Properties | Cybersecurity Concepts | Operational Capabilities | Security Domains |
---|---|---|---|---|
#Preventive | #Confidentiality | #Protect | #System and Network Security | #Protection |
#Integrity | ||||
#Availability |
Ownership of Control 8.21
Control 8.21 deals with technical concepts relating to the maintenance and management of several key components of an organisation’s ICT network. As such, ownership should rest with the Head of IT, or organisational equivalent.
Get an 81% headstart
We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.
General Guidance on Compliance
Control 8.21 identifies three main security types, when addressing the broader concept of network service security:
- Security features
- Service levels
- Service requirements
These three measures should be taken into account by all internal and external network service providers, and the organisation should take steps to ensure that providers are fulfilling their obligations at all times.
Organisations should judge a network service provider on their ability to manage services as dictated by an unambiguous set of SLAs, and monitor adherence to the best of their ability.
Part of this operational assessment should include references obtained from trusted sources that attest to a network service provider’s ability to manage services in a secure and efficient manner.
Network security rules should include:
- Any network services and associated networks that are allowed to be accessed.
- The authentication requirements for accessing said network services, including who is authorised to access them, from where and when they are able to do so.
- How personnel obtain prior authorisation to access network services, including final sign-off and business case analysis.
- A robust set of network management controls that safeguard network services against misuse and unauthorised access.
- How personnel are allowed to access network services (i.e. remotely or exclusively onsite).
- Logging procedures that detail key information about network service access, and the personnel who utilise them – e.g. time, location and device data.
- Monitoring the use of network services.
Guidance – Network Service Security
Control 8.21 also features guidance notes on how to increase security across all network services, including back-end functionality and user operation.
- Organisations should consider security features such as authentication, encryption and connection controls.
- Rigid parameters should be established that dictate the connection to network services.
- Users should be able to choose the amount of data cached (temporarily stored) by a network service to both increase overall performance and ensure that data isn’t excessively stored to the point of it being a tangible security risk.
- Restricting access to network services.
Manage all your compliance in one place
ISMS.online supports over 100 standards
and regulations, giving you a single
platform for all your compliance needs.
Changes and Differences from ISO 27002:2013
ISO 27002:2022-8.21 replaces ISO 27002:2003-13.1.2 (Security of network services).
27002:2022-8.21 contains several major additions to its 2013 counterpart, with the latter focusing entirely on network service security (which contains the same set of guidance notes) and omitting any general guidance whatsoever on network rules (see points 1-7 above under ‘General Guidance’).
New ISO 27002 Controls
New Controls
ISO/IEC 27002:2022 Control Identifier | ISO/IEC 27002:2013 Control Identifier | Control Name |
---|---|---|
5.7 | New | Threat intelligence |
5.23 | New | Information security for use of cloud services |
5.30 | New | ICT readiness for business continuity |
7.4 | New | Physical security monitoring |
8.9 | New | Configuration management |
8.10 | New | Information deletion |
8.11 | New | Data masking |
8.12 | New | Data leakage prevention |
8.16 | New | Monitoring activities |
8.23 | New | Web filtering |
8.28 | New | Secure coding |
Organisational Controls
People Controls
ISO/IEC 27002:2022 Control Identifier | ISO/IEC 27002:2013 Control Identifier | Control Name |
---|---|---|
6.1 | 07.1.1 | Screening |
6.2 | 07.1.2 | Terms and conditions of employment |
6.3 | 07.2.2 | Information security awareness, education and training |
6.4 | 07.2.3 | Disciplinary process |
6.5 | 07.3.1 | Responsibilities after termination or change of employment |
6.6 | 13.2.4 | Confidentiality or non-disclosure agreements |
6.7 | 06.2.2 | Remote working |
6.8 | 16.1.2, 16.1.3 | Information security event reporting |
Physical Controls
ISO/IEC 27002:2022 Control Identifier | ISO/IEC 27002:2013 Control Identifier | Control Name |
---|---|---|
7.1 | 11.1.1 | Physical security perimeters |
7.2 | 11.1.2, 11.1.6 | Physical entry |
7.3 | 11.1.3 | Securing offices, rooms and facilities |
7.4 | New | Physical security monitoring |
7.5 | 11.1.4 | Protecting against physical and environmental threats |
7.6 | 11.1.5 | Working in secure areas |
7.7 | 11.2.9 | Clear desk and clear screen |
7.8 | 11.2.1 | Equipment siting and protection |
7.9 | 11.2.6 | Security of assets off-premises |
7.10 | 08.3.1, 08.3.2, 08.3.3, 11.2.5 | Storage media |
7.11 | 11.2.2 | Supporting utilities |
7.12 | 11.2.3 | Cabling security |
7.13 | 11.2.4 | Equipment maintenance |
7.14 | 11.2.7 | Secure disposal or re-use of equipment |
Technological Controls
How ISMS.online Helps
The ISO 27002 standard is a set of guidelines that help organisations to protect their information assets. It is applicable to all types of organisations, irrespective of their size, structure or industry.
ISMS.online is a cloud-based platform that offers assistance in implementing the ISO 27002 standard efficiently and cost effectively.
It provides organisations with easy access to up-to-date information about their compliance status at all times through its user-friendly dashboard interface which allows managers to monitor their progress towards achieving compliance quickly and easily.
Contact us today to schedule a demo.