Malware rarely announces itself.
It blends into email, websites, updates, and everyday activity — until systems stop working or data is gone.
Annex A 8.7 exists to ensure organisations prevent, detect, and respond to malware effectively, reducing the risk of disruption, data loss, and compromise across the environment.
This control is about defence in depth, not blind reliance on anti-virus tools.

Annex A 8.7 of ISO 27001:2022 focuses on protection against malware.
At a practical level, this means:
The control does not state that anti-malware software alone is sufficient. It expects a coordinated, multi-layered approach.
Malware remains one of the most common causes of:
Attack vectors continue to evolve, including:
Annex A 8.7 ensures organisations do not rely on a single control, but address malware risk across people, process, and technology.
This control supersedes ISO 27001:2013 Annex A 12.2.1 and places stronger emphasis on awareness, layered controls, and resilience during abnormal operations such as maintenance.
A pragmatic approach to Annex A 8.7 typically includes the following elements.
Organisations should define how malware risks are addressed, including:
This approach should align with organisational risk, threat landscape, and operating environment.
Anti-malware software remains an important component.
Organisations typically:
However, Annex A 8.7 explicitly recognises that anti-malware tools alone are not sufficient.
Malware frequently exploits weak change control.
Organisations should:
Uncontrolled software installation significantly increases exposure.
Annex A 8.7 supports reducing opportunities for infection.
This may include:
Reducing exposure lowers detection and response burden.
Effective malware protection uses multiple layers.
This commonly includes:
If one layer fails, others reduce impact.
Detection must lead to action.
Organisations should ensure:
Silent detection is not effective detection.
ISO 27001:2022 places explicit emphasis on malware risk during:
Temporary weakening or disabling of controls should be:
Maintenance periods are a common exploitation window.
People remain a primary malware entry point.
Training should help personnel:
Awareness reduces both likelihood and dwell time.
Malware incidents often require recovery rather than cleanup.
Organisations should ensure:
Recovery capability is a key resilience measure, particularly for ransomware scenarios.
Organisations should:
Static controls degrade quickly in a dynamic threat landscape.
Annex A 8.7 does not require:
It does require organisations to:
Malware incidents usually exploit gaps between controls, not the absence of controls.
Malware defence fails most often through assumption.
Annex A 8.7 is about reducing the likelihood, impact, and duration of malware incidents.
When protection against malware is implemented effectively:
Malware is not a single threat.
It is a constant pressure on systems, people, and processes.
Annex A 8.7 ensures organisations respond to that reality — deliberately and consistently.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today