Most malware doesn’t break in.
It’s invited in through a browser.
Annex A 8.23 exists to ensure organisations restrict and control access to external websites, reducing the likelihood of malware infection, phishing, data leakage, and exposure to illegal or inappropriate content.
This control is about reducing exposure at the point users interact with the internet.

Annex A 8.23 of ISO 27001:2022 focuses on web filtering.
At a practical level, this means:
This is a new control in ISO 27001:2022, reflecting how frequently browsers are used as an attack vector.
Web access is one of the most common causes of:
Common attack scenarios include:
Annex A 8.23 ensures organisations reduce risk by controlling where users are allowed to browse, rather than relying solely on user judgement or endpoint protection.
A pragmatic approach to Annex A 8.23 typically includes the following elements.
Organisations should determine which types of websites:
This may include blocking:
Rules should be clear, documented, and aligned with acceptable use policies.
Web filtering controls should prevent access to:
Blocking access reduces the likelihood of:
Prevention is significantly more effective than clean-up.
Annex A 8.23 explicitly highlights websites that enable data upload.
Organisations should:
Unrestricted uploads increase the risk of:
ISO 27001:2022 recognises multiple web filtering approaches, including:
Organisations may combine techniques to improve accuracy and reduce false positives.
Web filtering should be considered for:
Controls should remain effective regardless of user location.
Threats change continuously.
Organisations should:
Static filtering rules degrade quickly.
Annex A 8.23 explicitly supports use of threat intelligence.
Organisations should:
Threat-led filtering improves relevance and effectiveness.
Web filtering is not sufficient on its own.
Organisations should ensure users:
Training should also cover:
People remain a key control point.
Where access to restricted websites is required:
Exceptions without control undermine the effectiveness of filtering.
Organisations should periodically review:
Monitoring supports continuous improvement and assurance.
Annex A 8.23 does not require:
It does require organisations to:
Most web-based attacks succeed because access was never restricted in the first place.
Web filtering fails when it is treated as optional.
Annex A 8.23 is about reducing the attack surface presented by the browser.
When web filtering is implemented effectively:
You cannot control the internet.
But you can control how your organisation interacts with it.
Annex A 8.23 ensures organisations do exactly that.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today