In this instalment of our ISO 27001:2022 blog series, we delve into two critical controls from Annex A: A.8.08 Management of Technical Vulnerabilities and A.8.09 Configuration Management. These controls are vital for maintaining a secure and resilient information security environment, helping organisations proactively address vulnerabilities and establish robust configuration practices. In this post, we’ll explore key considerations, practical steps, and best practices to ensure effective implementation of these controls, enabling your organisation to meet ISO 27001 requirements while safeguarding its assets against evolving threats.

A.8.8 Management of technical vulnerabilities

The aim of this control is pretty much what it says in the title… to prevent the exploitation of technical vulnerabilities.

To manage technical vulnerabilities, the asset register determined in A.5.9 - covered in this blog post, should be used as it will contain all of the information of each system including its current version, and who is responsible for it, including the vendor details.

Roles and responsibilities for handling the different aspects of vulnerability management should be established including monitoring, vulnerability risk assessment, updating, asset tracking.

The management of technical vulnerabilities requires a procedure to handle:

  • Identification of technical vulnerabilities
  • Evaluation of technical vulnerabilities
  • Addressing technical vulnerabilities

Vulnerability Identification

Vulnerabilities can be identified and discovered in a number of ways depending on the nature of the vulnerability and the system. 

Vulnerability scanning or assessment tools can be used to identify any vulnerabilities and verify whether patching has been successful. Additionally, penetration tests can be planned and performed by authorised persons to support identification of vulnerabilities.

Ensuring that any third-party software and libraries are tracked and supporting resources monitored to keep abreast of vulnerabilities and issues or receive vulnerability reports which are found by other parties or users of the software.

Evaluation of vulnerabilities

Vulnerabilities should be evaluated by analysing and verifying any reports received and then determining the next course of action to respond and remediate the issue.

Once a potential vulnerability has been identified, any associated risks and actions to be taken should be identified. Often the actions required will involve updating a vulnerable system or library or applying other controls.

Addressing Vulnerabilities

Addressing vulnerabilities often involves applying the most up to date patches and application updates for the software or system. 

Often, suppliers will often automatically release patches and updates to their systems, especially cloud providers or other SaaS products which you may use. Ensure that these are covered within any SLA you may have with them.

When determining how to address a vulnerability, consider the risks associated with the vulnerability and the efforts required for remediation. Based on the urgency and risk with remediation, the actions should be implemented following the Change Management procedure outlined in A.8.32 or following information security incident response procedures in A.5.26.
As per any other change, any remediation should be tested to confirm that remediation or mitigation is effective, and there is no regression of functionality. If there are breaking changes included as part of the update to third party library or system, efforts to update any other functionality affected will also need to be estimated and planned.
For those vulnerabilities where there is no immediate remediation available, or if you have to wait for a software update to be implemented and released, other controls can be considered such as workarounds suggested by the supplier or other relevant source. These can also include controls such as shielding vulnerable systems, devices or applications through suitable traffic filters
It should probably go without saying that an audit log should be kept for all steps in the technical vulnerability management process, and that this process should be aligned with incident management processes and the change management processes.

A.8.9 Configuration management

This control aims to ensure that your systems, function correctly with required security settings and configuration is not altered by unauthorised or incorrect changes. This applies to your hardware, software, services and network functions.

The process for configurating your systems should be defined and implemented using established processes and tools to enforce the configurations defined. The processes should define the roles, responsibilities required to control all changes to configurations.

Your configurations should be based on standard templates which you develop for each of the systems. When creating the templates, the following should be considered:

  • Minimising identities with administrator level access rights
  • Disabling or restricting unnecessary functions or services
  • Changing vendor default authentication information immediately after installation
  • Ensuring licensing requirements are met

Logs should be maintained of any changes to configurations which should be stored securely. Configurations should also be included in your system management tools including maintenance utilities, enterprise management tools, backup and restoration.

Author
Brad Fabiny

DQS Product Manager - Cyber Security and auditor for the ISO 9001, ISO 27001 standards and information security management systems (ISMS) with extensive experience in software development.

Loading...

Relevant articles and events

You may also be interested in this
Blog
iso27002-changes-dqs-a code of letters and numbers
Loading...

Implementing Web Filtering and Encryption in Line with ISO 27001 Controls A.8.23 – A.8.24

Blog
iso-27018-certification-dqs-display of multiple servers during programming
Loading...

Keeping Systems in Sync: Managing Time, Privileged Tools, and Software Installation in ISO 27001:2022 Controls A.8.17 – A.8.19

Blog
Monitor showing a hacked system
Loading...

Watch, Detect, Respond: Tips for Logging & Monitoring Activity on your system with ISO 27001:2022 Controls A.8.15 and A.8.16