Malware represents the single largest threat to business continuity and information security faced by businesses in the digital age.
The global commercial community faces innumerable daily threats from a broad range of attack vectors that seek to gain unauthorised access to sensitive systems and data, extract information and money, dupe unassuming employees and leverage ransomed data for extortionate sums of money.
An organisation’s approach to malware protection should be front and centre of any information security policy.
Control 8.7 contains an array of measures that helps organisations to educate their employees as to the dangers of malicious software, and implement meaningful practical measures that stop internal and external attacks before they have a chance to cause disruption and data loss.
Control 8.7 is a triple-purpose preventive, detective and corrective control that maintains risk by implementing policies and procedures that ensure an organisation’s information, data and assets are protected against malware.
Control Type | Information Security Properties | Cybersecurity Concepts | Operational Capabilities | Security Domains |
---|---|---|---|---|
#Preventive #Detective #Corrective | #Confidentiality #Integrity #Availability | #Protect #Detect | #System and Network Security #Information Protection | #Protection #Defence |
Whilst malware protection involves practical steps that need to be taken by ICT admin staff and standard users, the topic itself is wide-ranging and encompasses multiple distinct business functions with differing levels of risk and numerous additional ISO controls. As such, ownership of Control 8.7 should reside with the Chief Information Security Officer, or organisational equivalent.
Control 8.7 asks organisations to adopt an approach to malware protection that encompasses four key areas:
ISO categorically points out that it is a mistake to assume that anti malware software alone represents an adequate set of measures. Control 8.7 instead asks organisations to take an end-to-end approach to malware protection that begins with user education and ends with a tightly-controlled network that minimises the risk of intrusion across a variety of attack vectors.
To achieve this goal, organisations should implement controls that:
ISO 27002:2022-8.7 replaces ISO 27002:2003-12.2.1 (Controls against malware).
27002:2022-8.7 contains the same basic guidance points as 27002:2003-12.2.1, and elevates some of the supplementary guidance to general guidance points, in line with their importance to an organisation’s anti malware efforts, notably:
27002:2003-12.2.1 also asks organisations to consider using two separate anti malware platforms, whereas 27002:2022-8.7 is content with a single unified solution.
Our platform provides you with customisable dashboards that give you real-time visibility into your compliance status.
You can monitor and manage all aspects of your ISO 27002 compliance journey from one place – audit management, gap analysis, training management, risk assessment etc.
It provides an easy-to-use, integrated solution that can be accessed on a 24/7 basis via any device with an internet connection. The platform allows all employees to work together seamlessly and securely to manage security risks and track the organisation’s compliance, as well as the journey towards ISO 27001 certification.
Get in touch today to book a demo.
It helps drive our behaviour in a positive way that works for us
& our culture.
ISO/IEC 27002:2022 Control Identifier | ISO/IEC 27002:2013 Control Identifier | Control Name |
---|---|---|
5.7 | New | Threat intelligence |
5.23 | New | Information security for use of cloud services |
5.30 | New | ICT readiness for business continuity |
7.4 | New | Physical security monitoring |
8.9 | New | Configuration management |
8.10 | New | Information deletion |
8.11 | New | Data masking |
8.12 | New | Data leakage prevention |
8.16 | New | Monitoring activities |
8.23 | New | Web filtering |
8.28 | New | Secure coding |
ISO/IEC 27002:2022 Control Identifier | ISO/IEC 27002:2013 Control Identifier | Control Name |
---|---|---|
6.1 | 07.1.1 | Screening |
6.2 | 07.1.2 | Terms and conditions of employment |
6.3 | 07.2.2 | Information security awareness, education and training |
6.4 | 07.2.3 | Disciplinary process |
6.5 | 07.3.1 | Responsibilities after termination or change of employment |
6.6 | 13.2.4 | Confidentiality or non-disclosure agreements |
6.7 | 06.2.2 | Remote working |
6.8 | 16.1.2, 16.1.3 | Information security event reporting |
ISO/IEC 27002:2022 Control Identifier | ISO/IEC 27002:2013 Control Identifier | Control Name |
---|---|---|
7.1 | 11.1.1 | Physical security perimeters |
7.2 | 11.1.2, 11.1.6 | Physical entry |
7.3 | 11.1.3 | Securing offices, rooms and facilities |
7.4 | New | Physical security monitoring |
7.5 | 11.1.4 | Protecting against physical and environmental threats |
7.6 | 11.1.5 | Working in secure areas |
7.7 | 11.2.9 | Clear desk and clear screen |
7.8 | 11.2.1 | Equipment siting and protection |
7.9 | 11.2.6 | Security of assets off-premises |
7.10 | 08.3.1, 08.3.2, 08.3.3, 11.2.5 | Storage media |
7.11 | 11.2.2 | Supporting utilities |
7.12 | 11.2.3 | Cabling security |
7.13 | 11.2.4 | Equipment maintenance |
7.14 | 11.2.7 | Secure disposal or re-use of equipment |