Purpose of Control 8.21

In computing, a ‘network service’ can broadly be described as a system running on the ‘network application layer’, such as e-mail, printing, or a file server. Network services also include managed applications and security solutions such as firewalls or gateway antivirus platforms, intrusion detection systems and connection services.

Network services often represent the most important functional parts of a network, and are critical to the day-to-day operation of a modern commercial ICT network. Security is therefore paramount, and the use of network services needs to be closely monitored and directly managed to minimise the associated risk of failure, intrusion and business disruption.

Attributes Table of Control 8.21

Control 8.21 is a preventive control that maintains risk by establishing a set of rules that govern the use of both network services and, by association, the host network itself.

Control TypeInformation Security PropertiesCybersecurity ConceptsOperational CapabilitiesSecurity Domains
#Preventive#Confidentiality#Protect#System and Network Security#Protection
#Integrity
#Availability

Ownership of Control 8.21

Control 8.21 deals with technical concepts relating to the maintenance and management of several key components of an organisation’s ICT network. As such, ownership should rest with the Head of IT, or organisational equivalent.




Get an 81% headstart

We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.

Book a demo



General Guidance on Compliance

Control 8.21 identifies three main security types, when addressing the broader concept of network service security:

  1. Security features
  2. Service levels
  3. Service requirements

These three measures should be taken into account by all internal and external network service providers, and the organisation should take steps to ensure that providers are fulfilling their obligations at all times.

Organisations should judge a network service provider on their ability to manage services as dictated by an unambiguous set of SLAs, and monitor adherence to the best of their ability.

Part of this operational assessment should include references obtained from trusted sources that attest to a network service provider’s ability to manage services in a secure and efficient manner.

Network security rules should include:

  1. Any network services and associated networks that are allowed to be accessed.
  2. The authentication requirements for accessing said network services, including who is authorised to access them, from where and when they are able to do so.
  3. How personnel obtain prior authorisation to access network services, including final sign-off and business case analysis.
  4. A robust set of network management controls that safeguard network services against misuse and unauthorised access.
  5. How personnel are allowed to access network services (i.e. remotely or exclusively onsite).
  6. Logging procedures that detail key information about network service access, and the personnel who utilise them – e.g. time, location and device data.
  7. Monitoring the use of network services.

Guidance – Network Service Security

Control 8.21 also features guidance notes on how to increase security across all network services, including back-end functionality and user operation.

  • Organisations should consider security features such as authentication, encryption and connection controls.
  • Rigid parameters should be established that dictate the connection to network services.
  • Users should be able to choose the amount of data cached (temporarily stored) by a network service to both increase overall performance and ensure that data isn’t excessively stored to the point of it being a tangible security risk.
  • Restricting access to network services.



Manage all your compliance in one place

ISMS.online supports over 100 standards
and regulations, giving you a single
platform for all your compliance needs.

Book a demo



Changes and Differences from ISO 27002:2013

ISO 27002:2022-8.21 replaces ISO 27002:2003-13.1.2 (Security of network services).

27002:2022-8.21 contains several major additions to its 2013 counterpart, with the latter focusing entirely on network service security (which contains the same set of guidance notes) and omitting any general guidance whatsoever on network rules (see points 1-7 above under ‘General Guidance’).

New ISO 27002 Controls

New Controls


Organisational Controls

ISO/IEC 27002:2022 Control IdentifierISO/IEC 27002:2013 Control IdentifierControl Name
5.105.1.1, 05.1.2Policies for information security
5.206.1.1Information security roles and responsibilities
5.306.1.2Segregation of duties
5.407.2.1Management responsibilities
5.506.1.3Contact with authorities
5.606.1.4Contact with special interest groups
5.7NewThreat intelligence
5.806.1.5, 14.1.1Information security in project management
5.908.1.1, 08.1.2Inventory of information and other associated assets
5.1008.1.3, 08.2.3Acceptable use of information and other associated assets
5.1108.1.4Return of assets
5.1208.2.1Classification of information
5.1308.2.2Labelling of information
5.1413.2.1, 13.2.2, 13.2.3Information transfer
5.1509.1.1, 09.1.2Access control
5.1609.2.1Identity management
5.1709.2.4, 09.3.1, 09.4.3Authentication information
5.1809.2.2, 09.2.5, 09.2.6Access rights
5.1915.1.1Information security in supplier relationships
5.2015.1.2Addressing information security within supplier agreements
5.2115.1.3Managing information security in the ICT supply chain
5.2215.2.1, 15.2.2Monitoring, review and change management of supplier services
5.23NewInformation security for use of cloud services
5.2416.1.1Information security incident management planning and preparation
5.2516.1.4Assessment and decision on information security events
5.2616.1.5Response to information security incidents
5.2716.1.6Learning from information security incidents
5.2816.1.7Collection of evidence
5.2917.1.1, 17.1.2, 17.1.3Information security during disruption
5.30NewICT readiness for business continuity
5.3118.1.1, 18.1.5Legal, statutory, regulatory and contractual requirements
5.3218.1.2Intellectual property rights
5.3318.1.3Protection of records
5.3418.1.4Privacy and protection of PII
5.3518.2.1Independent review of information security
5.3618.2.2, 18.2.3Compliance with policies, rules and standards for information security
5.3712.1.1Documented operating procedures


People Controls


Physical Controls


How ISMS.online Helps

The ISO 27002 standard is a set of guidelines that help organisations to protect their information assets. It is applicable to all types of organisations, irrespective of their size, structure or industry.

ISMS.online is a cloud-based platform that offers assistance in implementing the ISO 27002 standard efficiently and cost effectively.

It provides organisations with easy access to up-to-date information about their compliance status at all times through its user-friendly dashboard interface which allows managers to monitor their progress towards achieving compliance quickly and easily.

Contact us today to schedule a demo.


Jump to topic

Max Edwards

Max works as part of the ISMS.online marketing team and ensures that our website is updated with useful content and information about all things ISO 27001, 27002 and compliance.

ISMS Platform Tour

Interested in an ISMS.online platform tour?

Start your free 2-minute interactive demo now and experience the magic of ISMS.online in action!

Try it for free

We’re a Leader in our Field

Users Love Us
Grid Leader - Spring 2025
Momentum Leader - Spring 2025
Regional Leader - Spring 2025 UK
Regional Leader - Spring 2025 EU
Best Est. ROI Enterprise - Spring 2025
Most Likely To Recommend Enterprise - Spring 2025

"ISMS.Online, Outstanding tool for Regulatory Compliance"

-Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

-Karen C.

"Innovative solution to managing ISO and other accreditations"

-Ben H.

SOC 2 is here! Strengthen your security and build customer trust with our powerful compliance solution today!