Annex A 8.7: Protection Against Malware
Annex a 8.7: protection against malware requirement means you must implement and operate controls that prevent, detect, and respond to malware across your environment, and you must be able to prove those controls run consistently. Operationalize it by standardizing endpoint and server protections, controlling software execution, scanning key ingress points, and retaining repeatable evidence for audit. 1
Key takeaways:
- Define a malware control standard (coverage, configs, logging, response) and apply it to endpoints, servers, cloud workloads, and email. 2
- Audits fail more often on missing operational evidence than on tool choice; set up recurring evidence capture from your EDR/AV and email security. 3
- Treat third parties as part of malware exposure: require malware controls for managed endpoints, support tools, and software deliveries. 2
Annex A 8.7 is straightforward on paper: protect systems and users from malware. In practice, teams stumble because “we have EDR” is not a control. Auditors will test whether protection is consistently deployed, appropriately configured, monitored, and tied to incident response and change management. They will also test whether you can show evidence across your full asset inventory, including remote endpoints, cloud workloads, and high-risk ingress paths such as email and downloaded files. 1
For a Compliance Officer, CCO, or GRC lead, the fastest path is to convert 8.7 into a small set of enforceable requirements that IT and Security can implement: (1) standard malware protections by asset class, (2) controlled execution and safe handling of untrusted code, (3) monitoring and alert response, and (4) recurring evidence capture mapped to the control. Your goal is to make malware protection measurable and auditable, not aspirational. 2
This page gives requirement-level implementation guidance you can hand to operators, plus the artifacts you should expect back to pass an ISO 27001 assessment. 1
Regulatory text
Control reference: ISO/IEC 27001:2022 Annex A 8.7 (Protection Against Malware). 1
Provided excerpt (summary-level): “ISO/IEC 27001:2022 Annex A control 8.7 implementation expectation (Protection Against Malware).” 1
What the operator must do: implement technical and procedural controls that reduce the likelihood of malware entering your environment, limit execution and spread when it does, and detect and respond with defined actions. You must also operate the control continuously and retain evidence that protections are deployed and monitored. 1
Plain-English interpretation (what 8.7 really requires)
You need an end-to-end “malware defense” capability that is:
- Deployed everywhere that matters (coverage),
- Configured to a standard (policy),
- Monitored with action taken (operations), and
- Proven with evidence (assurance). 2
A single endpoint tool does not satisfy this by itself. Malware reaches you through email, web, removable media, software downloads, developer dependencies, and third-party remote access. Annex A 8.7 expects you to manage those paths with layered defenses and documented operating routines. 1
Who it applies to (entity and operational context)
Applies to: service organizations seeking ISO/IEC 27001 certification or alignment, including SaaS providers, managed service providers, and internal shared-services teams that operate information systems. 2
Operational scope: any system that stores, processes, or transmits organizational information, plus supporting systems that can become a malware entry point (end-user devices, admin workstations, servers, VMs, containers, email, and collaboration tooling). Include BYOD if it can access corporate data. Include third-party managed endpoints if they connect to your network or handle your data. 2
What you actually need to do (step-by-step)
Use this as a build sheet for your control owner (typically SecOps) and your evidence owner (often GRC with IT/Security support). 2
1) Define your malware protection standard (write it down)
Create a concise standard that answers:
- Coverage requirement: which asset classes must have malware controls (workstations, servers, cloud workloads, email). 2
- Approved toolset: allowed EDR/AV agents, email filtering, sandboxing, web protection. Keep this short to reduce exceptions. 2
- Minimum configurations: real-time scanning, tamper protection, auto-update, scan schedules for high-risk folders, blocking policy for known-bad. 2
- Alerting and response: which detections are ticketed, triaged, escalated; how containment works (isolate host, kill process, quarantine file). 2
- Exception process: who can approve exclusions (for performance or false positives), time-boxed approvals, and compensating controls. 2
Deliverable: “Protection Against Malware Standard” mapped to Annex A 8.7 and your ISMS control matrix. 3
2) Prove deployment coverage against your asset inventory
Operational requirement: every in-scope asset is either protected or formally excepted. 2
Actions:
- Reconcile asset inventory vs. EDR/AV console inventory.
- Identify gaps: unmanaged endpoints, stale agents, offline hosts, shadow IT VMs.
- Fix with device enrollment, agent deployment automation, or network controls that block access until compliant. 2
Minimum evidence expectation: a recurring coverage report that ties back to the current asset list. 3
3) Control common ingress paths (email, web, downloads, removable media)
Make the requirement explicit for operators:
- Email: filtering for malicious attachments/links; blocking risky file types; sandboxing or detonation where available; policy for macros and external senders. 2
- Web and downloads: DNS/web filtering; browser hardening; blocking known malware categories; scanning downloaded files.
- Removable media: disable by default where feasible; scan on insertion; strict exception approvals. 2
Tie these to user policy: safe handling, reporting, and phishing/malware escalation paths. 2
4) Reduce execution and blast radius (hardening that helps 8.7)
Even though Annex A 8.7 is “malware,” auditors will accept layered controls that prevent execution/spread:
- Application allowlisting or controlled execution for high-risk admin workstations.
- Least privilege and removal of local admin rights where feasible.
- Segmentation between user and server networks; restrict lateral movement.
- Patch management integration for exploited software. 2
You do not need every technique, but you need a reasoned set that matches your risk assessment and environment. 2
5) Monitoring, triage, and incident linkage
Define an operational loop:
- Detections create tickets with severity and required response steps.
- Analysts document triage notes, containment actions, eradication actions, and recovery validation.
- Confirm lessons learned feed back into exclusions, hardening, and user controls. 2
If your IR process is separate, explicitly link malware detections to incident categories and escalation criteria. 2
6) Make evidence capture recurring and assessor-friendly
This is the most common gap: teams can’t show consistent operation. Build a lightweight evidence pack:
- Monthly (or other regular cadence you define) exports from EDR/AV: coverage, update health, top detections, response actions.
- Email security dashboards: blocked malware, quarantines, and disposition outcomes.
- Exception register: active exclusions with approvals and review dates. 3
Daydream tip (practical, not theoretical): set a recurring control “evidence task” that pulls the same reports each cycle and stores them with a short control attestation. That turns 8.7 into a repeatable control instead of a scramble before audit. 3
Required evidence and artifacts to retain
Keep artifacts that prove design and operation:
Design artifacts
- Malware Protection Policy/Standard mapped to Annex A 8.7. 2
- Tooling architecture diagram or control description: endpoints, servers, email, web controls. 2
- Exception process and approval workflow. 2
Operational evidence
- Asset inventory and EDR/AV coverage reconciliation report.
- EDR/AV management console screenshots/exports showing:
- agent deployment status,
- signature/engine update status,
- recent detections and actions taken. 3
- Email security logs/reports for malware quarantines and blocked attachments/URLs.
- Sample incident/ticket records for malware events, including containment and closure notes.
- Training or user guidance for reporting suspicious files/behavior (if part of your control design). 2
Common exam/audit questions and hangups
Expect these lines of questioning:
- “Show me coverage.” Which endpoints/servers are protected, and how do you know you didn’t miss any? Bring the inventory reconciliation. 3
- “Show me configuration.” Are protections enforced centrally, or can users disable them? Demonstrate tamper protection and policy enforcement. 2
- “Show me operations.” What happens when malware is detected? Provide tickets and analyst notes. 2
- “Show me exceptions.” Why is this exclusion allowed, who approved it, and when is it reviewed? 2
- “What about third parties?” If a third party connects remotely or provides managed endpoints, how do you ensure malware controls meet your standard? 2
Frequent implementation mistakes (and how to avoid them)
- Mistake: relying on “we bought EDR” without proving deployment. Fix: evidence pack must include coverage deltas vs. asset inventory. 3
- Mistake: unmanaged cloud workloads. Fix: require server/workload agents or equivalent cloud-native protections, and track them in inventory. 2
- Mistake: exclusions that never expire. Fix: time-box exclusions, require compensating controls, and review them on a defined cadence. 2
- Mistake: no operational linkage to incident response. Fix: define triage-to-IR thresholds and show at least a few closed examples. 2
- Mistake: evidence created “right before audit.” Fix: recurring evidence capture with consistent filenames, dates, and owners; Daydream can schedule and track this as a control operation task. 3
Risk implications (why assessors care)
Malware is a common root cause of availability loss, data compromise, and credential theft. From an ISO perspective, failure on 8.7 usually signals broader control-operation weakness: incomplete inventories, weak endpoint management, poor monitoring, and untested response. That drives nonconformities because the ISMS cannot demonstrate effective operation. 2
Practical 30/60/90-day execution plan
Numbers below are planning buckets, not a promise of elapsed time; scale based on your environment complexity and resourcing.
First 30 days (stabilize and define)
- Assign control owner (SecOps) and evidence owner (GRC).
- Publish the Malware Protection Standard and exception workflow mapped to Annex A 8.7. 3
- Pull current asset inventory and EDR/AV inventory; produce first gap list.
- Identify top ingress paths in your environment (email, endpoints, remote access) and document current controls. 2
By 60 days (close coverage gaps and operationalize)
- Remediate highest-risk coverage gaps (admin workstations, domain controllers, externally exposed systems).
- Centralize policy enforcement (prevent user disablement; enforce updates).
- Implement ticketing integration for detections and define response runbooks.
- Start recurring evidence capture cycle (reports, screenshots, tickets, exception register). 3
By 90 days (prove repeatability and audit readiness)
- Run a tabletop or operational review of malware response workflow using real recent detections or a controlled test file, then document outcomes. 2
- Review exceptions and remove stale exclusions.
- Produce an assessor-ready evidence folder: standard, coverage reports over multiple cycles, sample incidents, and change records for configuration updates. 3
- If you use Daydream, map tasks to control 8.7 and automate reminders plus evidence collection prompts so the control runs without heroics. 3
Frequently Asked Questions
Does Annex A 8.7 require a specific anti-malware tool or EDR product?
No tool is mandated by ISO 27001. Assessors focus on whether your controls prevent/detect/respond to malware and whether you can prove consistent operation. 2
Are servers and cloud workloads in scope, or just employee laptops?
Anything in scope for your ISMS can be in scope for malware protection, including servers and cloud workloads. Define asset classes explicitly in your malware standard and show coverage evidence per class. 2
How do we handle developer machines where AV exclusions are common?
Allow exclusions only through an approval workflow, document the business reason, add compensating controls where needed, and review exclusions on a defined cadence. Keep an exception register as audit evidence. 2
What evidence is “enough” for an ISO auditor?
Provide a written standard, proof of deployment coverage, proof of updates/config enforcement, and a sample set of detections or tickets showing triage and response. Recurring evidence beats one-time screenshots. 3
What about third-party support tools (remote access, RMM agents) that can deliver malware?
Treat them as part of your malware threat model. Require security controls in contracts and access controls in your environment, then verify operationally (approved tooling, monitored sessions, limited privileges). 2
We rarely see malware detections. Will that fail the control?
Low detections are not a failure by themselves. Auditors still expect proof that protections are deployed, updated, and monitored, plus evidence that alerts would route into triage and incident response if they occurred. 2
Footnotes
Frequently Asked Questions
Does Annex A 8.7 require a specific anti-malware tool or EDR product?
No tool is mandated by ISO 27001. Assessors focus on whether your controls prevent/detect/respond to malware and whether you can prove consistent operation. (Source: ISO/IEC 27001 overview)
Are servers and cloud workloads in scope, or just employee laptops?
Anything in scope for your ISMS can be in scope for malware protection, including servers and cloud workloads. Define asset classes explicitly in your malware standard and show coverage evidence per class. (Source: ISO/IEC 27001 overview)
How do we handle developer machines where AV exclusions are common?
Allow exclusions only through an approval workflow, document the business reason, add compensating controls where needed, and review exclusions on a defined cadence. Keep an exception register as audit evidence. (Source: ISO/IEC 27001 overview)
What evidence is “enough” for an ISO auditor?
Provide a written standard, proof of deployment coverage, proof of updates/config enforcement, and a sample set of detections or tickets showing triage and response. Recurring evidence beats one-time screenshots. (Source: ISMS.online Annex A control index)
What about third-party support tools (remote access, RMM agents) that can deliver malware?
Treat them as part of your malware threat model. Require security controls in contracts and access controls in your environment, then verify operationally (approved tooling, monitored sessions, limited privileges). (Source: ISO/IEC 27001 overview)
We rarely see malware detections. Will that fail the control?
Low detections are not a failure by themselves. Auditors still expect proof that protections are deployed, updated, and monitored, plus evidence that alerts would route into triage and incident response if they occurred. (Source: ISO/IEC 27001 overview)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream