ISO 27001:2022 Annex A 8.20 – Network Security Explained

Networks are where information moves — and where attackers look first.
If the network isn’t controlled, everything connected to it is exposed.

Annex A 8.20 exists to ensure organisations design, operate, and monitor networks securely, preventing unauthorised access, protecting data in transit, and limiting the impact of security incidents.

This control is about structural security, not just perimeter devices.

ISO 27001

Quick Guide: Annex A 8.20 at a Glance

Annex A 8.20 of ISO 27001:2022 focuses on network security.

At a practical level, this means:

  • Protecting networks from unauthorised access and misuse
  • Controlling how data flows across networks
  • Segregating networks and network traffic where risk justifies it
  • Monitoring network activity for security-relevant events
  • Managing network components as critical security assets

The control does not mandate a specific architecture. It expects risk-based, well-managed network security controls aligned with business and operational needs.

In-Depth Guide to Annex A 8.20

What Is Annex A 8.20 and Why Does It Matter?

Networks connect:

  • Users
  • Systems and applications
  • Cloud services
  • Third-party suppliers

A weakness anywhere on the network can:

  • Enable unauthorised access
  • Allow lateral movement after compromise
  • Expose sensitive information
  • Undermine availability and resilience

Common network-related failures include:

  • Flat networks with no segmentation
  • Unmanaged or unknown devices
  • Weak or inconsistent filtering rules
  • Poor visibility of network activity

Annex A 8.20 ensures organisations treat the network as a security control in its own right, not just a transport layer.

This control replaces ISO 27001:2013 Annex A 13.1.1 and reflects modern hybrid, cloud, and interconnected environments.

How to Implement Annex A 8.20 Effectively

A pragmatic approach to Annex A 8.20 typically includes the following elements.

1. Define Network Security Responsibilities

Organisations should clearly define responsibility for:

  • Network design and architecture
  • Network configuration and maintenance
  • Security monitoring and response

Network security should be distinct from general system administration, even if roles overlap.

2. Document and Maintain Network Architecture

Organisations should maintain accurate, up-to-date documentation, including:

  • Network diagrams
  • Segmentation and trust boundaries
  • Key network devices and connections

Documentation supports:

  • Risk assessment
  • Incident response
  • Change management

Undocumented networks are unmanageable networks.

3. Segregate Networks Based on Risk

Annex A 8.20 strongly supports network segregation.

Segregation may include:

  • Separation of business-critical systems
  • Isolation of sensitive data environments
  • Separation of administrative traffic from user traffic
  • Segregation of development, test, and production environments

Segmentation limits the spread of incidents and reduces blast radius.

4. Control Network Access

Network access should be:

  • Restricted to authorised users, systems, and devices
  • Based on defined roles and responsibilities

Controls may include:

  • Authentication before network access
  • Device identification and validation
  • Restrictions on unauthorised or unmanaged devices

If you don’t know what is connected, you don’t control the network.

5. Protect Data in Transit

Annex A 8.20 expects organisations to protect information as it moves across networks.

This may include:

  • Encryption of network traffic
  • Secure communication protocols
  • Protection of data transmitted across third-party networks

Protection should reflect data sensitivity and exposure risk.

6. Filter and Control Network Traffic

Organisations should apply rules that:

  • Permit only required traffic
  • Block unnecessary or risky protocols
  • Restrict inbound and outbound connections

Traffic filtering should be:

  • Documented
  • Reviewed
  • Updated as systems and threats change

Default allow is rarely defensible.

7. Monitor Network Activity

Network security depends on visibility.

Organisations should:

  • Monitor network traffic and events
  • Detect abnormal or suspicious behaviour
  • Correlate network activity with logs and alerts

This aligns directly with:

Networks often show the first signs of compromise.

8. Manage Network Devices as Security Assets

Network equipment should be:

  • Inventoried and identifiable
  • Configured securely
  • Maintained and updated

This includes:

  • Routers
  • Firewalls
  • Switches
  • Wireless access points

Outdated or misconfigured devices create systemic risk.

9. Control Administrative Access to Network Components

Administrative access should be:

  • Restricted to authorised personnel
  • Logged and monitored
  • Separated from normal user access

Network administration is privileged activity and should be treated accordingly.

10. Address Third-Party and Interconnected Networks

Annex A 8.20 explicitly includes:

  • Connections to suppliers and partners
  • Cloud service connectivity
  • Shared or external networks

Organisations should ensure:

  • Security responsibilities are defined
  • Network access is limited to what is required
  • Interconnections are monitored and reviewed

External connectivity expands the attack surface.

11. Maintain the Ability to Isolate Networks During Incidents

During a security incident, organisations may need to:

  • Segregate affected sub-networks
  • Disable compromised connections
  • Temporarily suspend vulnerable protocols

Prepared isolation capability reduces impact and recovery time.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Practical Considerations

Annex A 8.20 does not require:

  • Enterprise-scale network complexity everywhere
  • Zero trust architectures by default
  • Constant re-architecture

It does require organisations to:

  • Understand their network
  • Control who and what can communicate
  • Monitor activity that matters

Most attackers succeed because networks are too permissive.

Common Challenges and How to Overcome Them

  • Flat networks with no segmentation
  • Introduce risk-based network separation
  • Unknown or unmanaged devices
  • Maintain visibility and control of network connections
  • Filtering rules never reviewed
  • Periodically review and rationalise traffic rules
  • No monitoring of network activity
  • Align network visibility with logging and monitoring controls

Network weaknesses are architectural, not accidental.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Final Recommendations

Annex A 8.20 is about controlling how systems talk to each other.

When network security is implemented effectively:

  • Unauthorised access is harder
  • Incidents spread less
  • Detection is faster
  • Recovery is more controlled

Applications protect data.
Users handle information.
Networks connect everything.

Annex A 8.20 ensures those connections are deliberate, controlled, and defensible.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

The Annex Control Table

ISO 27001:2022 Organisational Controls
ISO 27001:2022 Technological Controls