Welcome to your guide on ISO 27001 Annex A 8.19. If you are preparing for certification, you might feel overwhelmed by the sheer number of controls. At ISO27001.com, we understand this challenge. We want to help you break it down into manageable tasks. Today, we are looking at a specific control that deals with the installation of software on operational systems.
This control is critical for maintaining the stability and security of your production environment. It effectively stops users from installing unauthorised programs that could cause conflicts or introduce vulnerabilities. Let us explore what this means for you and how you can satisfy an auditor.
Table of contents
What is Annex A 8.19?
Annex A 8.19 is titled “Installation of software on operational systems”. In simple terms, it requires you to have strict rules about what software can be installed on your live systems. This covers servers, workstations, and any device used for business operations.
The goal is to prevent the chaos that comes from uncontrolled installations. If anyone can install anything, you risk malware infections, software conflicts, and licensing issues. This control asks you to implement a procedure to govern this process.
Why This Control Matters
Imagine a scenario where an employee installs a free tool they found online to convert PDF files. This tool might contain spyware. Suddenly, your secure network is compromised. Or perhaps a developer updates a library on a live server without testing it first, and your website crashes.
These are the risks Annex A 8.19 helps you avoid. By controlling installation, you ensure that only approved, tested, and necessary software runs on your infrastructure. It keeps your environment clean and predictable.
How to Implement the Control
Implementing this control does not have to be complicated. You need a clear process. Here is a practical approach to getting it right.
Establish a Policy
You must start with a policy. This document should state clearly that users cannot install software without prior approval. You should define what types of software are allowed and which are strictly banned. Make sure all employees read and understand this policy.
Create an Approved Software List
Building a whitelist is a smart move. This is a list of software that you have already vetted and approved for use. If a user needs something from this list, they can have it. If they want something else, they must make a formal request.
Restrict Administrative Privileges
This is perhaps the most effective technical step. You should remove local administrator rights from standard users. If a user does not have permission to install programs, they cannot accidentally violate the policy. Only your IT team or system administrators should have the power to install software.
Test Before You Install
For servers and critical systems, you should never install software directly into production. You need a staging or testing environment. Install the update or new software there first. Check if it causes any issues. Only once you are sure it is safe should you move it to the live environment.
Keep a Log
You need to keep a record of what was installed, who installed it, and when. This audit trail is essential. If something goes wrong, you can look back at the logs to see what changed.
What We Expect as Your Certification Body
When an auditor from a body like ISO27001.com visits you, we are looking for evidence. We do not just take your word for it. We need to see that your process works in reality.
We will likely ask to see your policy on software installation. We want to see that it is up to date and that people know about it. We will also look at your computer settings. We might check a random sample of laptops to see if standard users have admin rights. If we find that everyone is an administrator, that is a major problem.
We also expect to see your change management records. If you updated software on a key server last week, we want to see the ticket or form that authorised it. We want to see proof that it was tested.

Common Mistakes to Avoid
We see many companies fail here because they are too relaxed. Do not allow exceptions just because someone is a senior manager. Security risks do not care about job titles.
Another mistake is failing to remove old software. Annex A 8.19 also implies managing the lifecycle of software. If you no longer need a program, you should remove it. Leaving unused software installed increases your attack surface.
Conclusion
Implementing Annex A 8.19 is about discipline. It requires you to say “no” to random installations and “yes” to a structured process. It protects your systems from the unknown. By following these steps, you will not only satisfy us as your certification body but also build a much more robust IT environment. If you need templates or further guidance, resources are available at ISO27001.com to help you on your journey.
