ISO 27001 Annex A 8.7 Protection Against Malware

ISO27001 Annex A 8.7 Protection Against Malware

What is ISO 27001 Annex A 8.7 in ISO 27001?

Annex A 8.7 Protection Against Malware involves a documented strategy to detect and prevent malicious code. Organisations should integrate these procedures into existing tools like SharePoint. This control ensures staff manage malware risks through daily operational tasks. It excludes reliance on external software interfaces without internal oversight.

Auditor’s Eye: The Shortcut Trap

Relying on automated SaaS dashboards for malware compliance is dangerous. These tools often show a green tick while internal logs go unreviewed. I want to see your local configuration standards in SharePoint. I look for Jira tickets where you investigated a detection. Black box software decouples security from your staff. This lack of ownership often leads to failed audits. Real compliance lives in your internal records.

2013 Control 2022 Control Requirement Change
A.12.2.1 Controls against malware A.8.7 Protection against malware Minor wording update. Focus remains on prevention, detection, and recovery.

How to Implement ISO 27001 Annex A 8.7 (Step-by-Step)

Managing malware requires active oversight of software installation and detection logs. Use your existing organisational tools to manage these requirements. This ensures the process becomes a cultural habit rather than a software installation.

  • Draft your malware policy in SharePoint with clear version control.
  • Use Jira to approve all software installation requests.
  • Record periodic anti-malware configuration reviews in your internal wiki.
  • Link automated alerts to Jira tickets for immediate human review.
  • Verify that anti-malware software updates automatically across all endpoints.
  • Discuss detection trends in monthly management meetings.

ISO 27001 Annex A 8.7 Audit Evidence Checklist

Focus on manual records and internal document versions. These prove human oversight and intent. Auditors want to see that your team actively manages the security programme.

  • Version-controlled Malware Policy stored in SharePoint.
  • Meeting minutes reviewing malware logs and incident trends.
  • Jira tickets for anti-virus alerts and subsequent investigations.
  • Staff training logs for malware awareness in your internal wiki.
  • Screenshots of configuration settings stored in a secure folder.

Relational Mapping

Annex A 8.7 does not work in isolation. It relies on several other controls:

  • Annex A 8.8: Management of technical vulnerabilities.
  • Annex A 8.16: Monitoring of security events and activities.
  • Annex A 8.19: Security for installations in information systems.

Auditor Interview

Auditor: How do you know your anti-virus is working?

Manager: We review the detection logs monthly. We record these sessions in our SharePoint meeting minutes.

Auditor: What happens when a laptop detects a threat?

Manager: The system raises a Jira ticket. Our security team then investigates and records the outcome.

Common Non-Conformities

Failure Mode Description Corrective Action
Automated Complacency Relying on a dashboard tick without internal review logs. Record manual reviews of detection logs in SharePoint.
Unauthorised Installations Staff install software without following a documented process. Enforce software requests through a Jira workflow.
Expired Policies The malware policy is outdated or lacks management sign-off. Review and approve policies annually in SharePoint.

Frequently Asked Questions

What is ISO 27001 Annex A 8.7?

The Bottom Line: It is the requirement to prevent, detect, and remove malicious software. You must document this process within your business-as-usual tools. This ensures your protection remains under your direct management control. It prevents reliance on unmonitored external dashboards.

How does malware protection link to Jira?

The Bottom Line: Use Jira to track incidents and software requests. This provides a clear audit trail for any malware detections. Auditors want to see that you investigate and resolve every alert. Jira ensures your team takes ownership of the security process.

Can I use SharePoint for malware evidence?

The Bottom Line: Yes, SharePoint is excellent for storing policies and meeting minutes. Version control proves that you update your procedures regularly. It keeps your security evidence in a central, manageable repository. This is vital for a successful ISO 27001 audit.

LA CASA DE CERTIFICACIÓN