Complex compositions of modern information systems, and the ever-changing cyber security threat landscape make information systems more vulnerable to known and potential security threats.
Control 8.27, addresses how organisations can eliminate security threats to information systems by creating secure system engineering principles that are applied to all phases of the information system life-cycle.
Control 8.27 enables organisations to maintain the security of information systems during the design, deployment, operation stages by establishing and implementing secure system engineering principles that system engineers comply with.
Control 8.27 is a preventive type of control that requires organisations to eliminate known and potential threats to the confidentiality, integrity, and availability of information assets stored on or processed through information systems such as storage media, databases, and applications via establishing principles for secure system engineering.
Control Type | Information Security Properties | Cybersecurity Concepts | Operational Capabilities | Security Domains |
---|---|---|---|---|
#Preventive | #Confidentiality #Integrity #Availability | #Protect | #Application Security #System and Network Security | #Protection |
Chief Information Security Officer should be held responsible for the establishment, maintenance, and implementation of principles that govern secure engineering of information systems.
Control 8.27 highlights that organisations should embed security into all layers of information systems, including business processes, applications, and data architecture.
Furthermore, secure engineering principles should apply to all activities related to information systems and should be subject to regular review and updates taking into account emerging threats and attack patterns.
In addition to information systems developed and operated internally, Control 8.27 also applies to information systems created by external service providers.
Therefore, organisations should ensure that service providers’ practices and standards comply with their own secure engineering principles.
Control 8.27 requires secure system engineering principles to cover the eight following issues:
Organisations should consider the following zero-trust principles:
Organisations should consider the following when establishing secure system engineering principles:
We can’t think of any company whose service can hold a candle to ISMS.online.
Control 8.27 notes that organisations can put secure engineering principles into practice when configuring the following:
Furthermore, the use of secure virtualisation technology can help eliminate the risk of interception between two applications running on the same device.
Lastly, it is pointed out that the use of tamper resistance systems can help identify both the logical and physical tampering with information systems and prevent unauthorised extraction of information.
27002:2022/8.27 replace 27002:2013/(14.2.5)
2022 version introduces more comprehensive requirements compared to the 2013 version:
ISO 27002 implementation is simpler with our step-by-step checklist that guides you through the whole process. Your complete compliance solution for ISO/IEC 27002:2022.
Get in touch today to book a demo.
We’ll give you an 81% headstart
from the moment you log in
Book your demo
ISO/IEC 27002:2022 Control Identifier | ISO/IEC 27002:2013 Control Identifier | Control Name |
---|---|---|
5.7 | New | Threat intelligence |
5.23 | New | Information security for use of cloud services |
5.30 | New | ICT readiness for business continuity |
7.4 | New | Physical security monitoring |
8.9 | New | Configuration management |
8.10 | New | Information deletion |
8.11 | New | Data masking |
8.12 | New | Data leakage prevention |
8.16 | New | Monitoring activities |
8.23 | New | Web filtering |
8.28 | New | Secure coding |
ISO/IEC 27002:2022 Control Identifier | ISO/IEC 27002:2013 Control Identifier | Control Name |
---|---|---|
6.1 | 07.1.1 | Screening |
6.2 | 07.1.2 | Terms and conditions of employment |
6.3 | 07.2.2 | Information security awareness, education and training |
6.4 | 07.2.3 | Disciplinary process |
6.5 | 07.3.1 | Responsibilities after termination or change of employment |
6.6 | 13.2.4 | Confidentiality or non-disclosure agreements |
6.7 | 06.2.2 | Remote working |
6.8 | 16.1.2, 16.1.3 | Information security event reporting |
ISO/IEC 27002:2022 Control Identifier | ISO/IEC 27002:2013 Control Identifier | Control Name |
---|---|---|
7.1 | 11.1.1 | Physical security perimeters |
7.2 | 11.1.2, 11.1.6 | Physical entry |
7.3 | 11.1.3 | Securing offices, rooms and facilities |
7.4 | New | Physical security monitoring |
7.5 | 11.1.4 | Protecting against physical and environmental threats |
7.6 | 11.1.5 | Working in secure areas |
7.7 | 11.2.9 | Clear desk and clear screen |
7.8 | 11.2.1 | Equipment siting and protection |
7.9 | 11.2.6 | Security of assets off-premises |
7.10 | 08.3.1, 08.3.2, 08.3.3, 11.2.5 | Storage media |
7.11 | 11.2.2 | Supporting utilities |
7.12 | 11.2.3 | Cabling security |
7.13 | 11.2.4 | Equipment maintenance |
7.14 | 11.2.7 | Secure disposal or re-use of equipment |