Networks are where information moves — and where attackers look first.
If the network isn’t controlled, everything connected to it is exposed.
Annex A 8.20 exists to ensure organisations design, operate, and monitor networks securely, preventing unauthorised access, protecting data in transit, and limiting the impact of security incidents.
This control is about structural security, not just perimeter devices.

Annex A 8.20 of ISO 27001:2022 focuses on network security.
At a practical level, this means:
The control does not mandate a specific architecture. It expects risk-based, well-managed network security controls aligned with business and operational needs.
Networks connect:
A weakness anywhere on the network can:
Common network-related failures include:
Annex A 8.20 ensures organisations treat the network as a security control in its own right, not just a transport layer.
This control replaces ISO 27001:2013 Annex A 13.1.1 and reflects modern hybrid, cloud, and interconnected environments.
A pragmatic approach to Annex A 8.20 typically includes the following elements.
Organisations should clearly define responsibility for:
Network security should be distinct from general system administration, even if roles overlap.
Organisations should maintain accurate, up-to-date documentation, including:
Documentation supports:
Undocumented networks are unmanageable networks.
Annex A 8.20 strongly supports network segregation.
Segregation may include:
Segmentation limits the spread of incidents and reduces blast radius.
Network access should be:
Controls may include:
If you don’t know what is connected, you don’t control the network.
Annex A 8.20 expects organisations to protect information as it moves across networks.
This may include:
Protection should reflect data sensitivity and exposure risk.
Organisations should apply rules that:
Traffic filtering should be:
Default allow is rarely defensible.
Network security depends on visibility.
Organisations should:
This aligns directly with:
Networks often show the first signs of compromise.
Network equipment should be:
This includes:
Outdated or misconfigured devices create systemic risk.
Administrative access should be:
Network administration is privileged activity and should be treated accordingly.
Annex A 8.20 explicitly includes:
Organisations should ensure:
External connectivity expands the attack surface.
During a security incident, organisations may need to:
Prepared isolation capability reduces impact and recovery time.
Annex A 8.20 does not require:
It does require organisations to:
Most attackers succeed because networks are too permissive.
Network weaknesses are architectural, not accidental.
Annex A 8.20 is about controlling how systems talk to each other.
When network security is implemented effectively:
Applications protect data.
Users handle information.
Networks connect everything.
Annex A 8.20 ensures those connections are deliberate, controlled, and defensible.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today