Skip to content

Hit enter to search or ESC to close

What Is the ISO 27001 Specification?

ISO 27001 (or ISO/IEC 27001:2022) is a series of guidelines that define how to create an Information Security Management System (ISMS). An ISMS comprises a framework of policies that helps establish, implement, maintain, and continually improve an organization’s information risk management processes.  Annex A of ISO 27001 provides a series of security controls that offer a way to proactively identify and manage cyber threats in a continually evolving threat landscape.

ISO 27002 is a supplementary standard that describes, in detail, the security controls listed in Annex A of ISO 27001.

Over time, changes in the threat landscape have meant that the security controls have required amendments and reorganization. ISO 27001 now lists 93 controls, grouped into four themes:

  1. Organisational (37 controls)
  2. People (8 controls)
  3. Physical (14 controls)
  4. Technological (44 controls)

Examples of controls in the latest version (ISO27001:2022) include:

  • Threat intelligence
  • Information security for the use of cloud services
  • Security awareness and training
  • ICT readiness for business continuity
  • Physical security monitoring
  • Configuration management
  • Information deletion
  • Data masking
  • Data leakage prevention
  • Monitoring activities
  • Web filtering
  • Secure coding

During ISO 27001 accreditation, any controls not implemented by an organization must be justified in an SoA (Statement of Applicability).

Web filtering is an essential element in the ISO 27001 security controls. Web filtering is found in ISO 27001:2022 Annex A Control 8.23, “Access to external websites should be managed to reduce exposure to malicious content.”

Control 8.23 identifies web filtering as a security measure to prevent access to malicious or inappropriate websites. Using web filtering to comply with ISO 27001 ISMS security controls helps reduce the risks associated with malware infections and data breaches. ISO 27001 Control 8.23 recommends blocking high-risk websites, enforcing least privileged access, and training staff on safe internet use.

Auditors require evidence that your company is actively preventing access to malicious websites. This can be achieved by generating reports using a web filter, such as WebTitan.

Why Is ISO 27001 So Important?

Internet-based threats are continually evolving. In recent years, AI-powered threats have posed challenges for detecting and preventing ransomware, malware infections, phishing, and data breaches. ISO 27001 provides a set of standards and guidance that reflects the current state of play in the cyber threat landscape. The policies and security controls provided by ISO 27001 are proactive measures. Together, they form a systematic approach to securing the data, people, and resources of an organization in the form of an Information Security Management System (ISMS).

When fully implemented, the security controls cover the entire organization's digital and physical infrastructure.  ISO27001 also incorporates a business’s people and its organizational requirements to ensure that cybersecurity is a holistic exercise.

Having a comprehensive and systematic approach to securing your organization’s assets shows your customers, clients, and business partners that you take security seriously and will protect their data as well as your own.

Having a protected ISMS offers insight into the robust security posture of an organization. In an era of sophisticated, evasive, and complex cyber threats, a comprehensive cybersecurity approach based on ISO 27001 demonstrates to the world that your company is serious about security.

What Businesses Need ISO 27001 Accreditation?

ISO 27001 accreditation is not a legal requirement. However, many tenders, especially government bids, either require ISO27001 accreditation or give preference to vendors who can demonstrate they use recognized security controls.

Industries that fall into the category of critical infrastructure, such as telecoms, government, financial, healthcare, utilities, and manufacturing, should be ISO 27001 accredited.

Any organization with ISO 27001 offers demonstrable proof of its commitment to securing data and digital assets.

As such, a company with ISO 27001 accreditation has a competitive advantage over those without it.

Did You Know?

72%

businesses experienced a DNS attack

60,000

malware & spyware domains categorised a day

53

predefined categories by default

7%

of websites tested by Google for malware were infected

Do All Web Filtering Services Meet ISO 27001 Specification?

ISO27001 accreditation is awarded to a company, not a product. However, web filtering is a control within ISO27001 (Annex A: 8.23) and, as such, a web filtering service must meet the requirements of this control.

When evaluating a web filter to meet ISO 27001 Control 8.23, look for the following features and capabilities:

Proactive malicious website detection

The evolving threat landscape is challenging. Malicious domains are automatically generated. Conventional web filters use a hard-coded database of known malicious URLs. Choose a web filter that utilizes machine learning, trained using a vast threat corpus. AI-powered web filters are dynamic and able to identify emerging and zero-day threats.

Cloud-based web filtering

A cloud-based web filter is scalable, easier to manage, and configure. This helps ensure that important changes are made quickly to maintain protection.

Dealing with encrypted malicious websites

Most malicious websites use HTTPS to trick people into believing they are secure.  A compliant web filter must be able to handle encrypted (HTTPS) websites.

Evidence of compliance

ISO27001 accreditation and audit requires proof of adherence to the security controls under Annex A. A web filter must be able to generate comprehensive reports on demand or using automation.

Access management and policies

A web filter must control access to the configuration and management. The filter must also provide granular policy enforcement based on groups or individuals.

TitanHQ has ISO 27001 certification.

What Are The ISO 27002 Information Security Controls?

Four categories

  1. Organisational (37 controls)
  2. People (8 controls)
  3. Physical (14 controls)
  4. Technological (44 controls)

93 controls

ISO27001: 2005 was updated to ISO27001: 2022 to include 11 new controls; ISO 27001 Annex A web filtering is one of the new controls.

Five attributes

  1. Control types
  2. Information security
  3. Cybersecurity concepts
  4. Operational capabilities
  5. Security domain

Some examples of controls include the following:

Organizational:

Control 5.1: Policies for information security

Control 5.7 Threat intelligence

Control 5.12: Classification of information

Control 5.15: Access control

People:

Control 6.3: Information security awareness, education, and training

Control 6.7: Remote working

Physical:

Control 7.2: Physical entry

Control 7.6: Working in secure areas

Control 7.10: Storage media

Technological:

Control 8.5: Secure authentication

Control 8.7:  Protection against malware

Control 8.12: Data leakage prevention

Control 8.23: Web filtering

Control 8.24: Use of cryptography

ISO 27001 provides the scope and design to create an ISMS, and ISO27002 gives guidance on the controls that protect the ISMS.

WebTitan and ISO 27001 Compliance

ISO 27001: 2022 included the new control 8.23, web filtering. This new control builds upon existing controls that overlap with a web filter, namely, Control 8.7: protection against malware and Control 8.16 monitoring of activities.

WebTitan is an advanced AI-powered web filter that meets the requirements of ISO27001 for web filtering and other related controls. WebTitan features that help an organization to meet the requirements of ISO 27001 are as follows:

  • Real-time URL threat protection powered by machine learning trained using 650 million end users and growing.
  • A real-time database containing over 3 million malicious URLs, phishing sites, and IP addresses.
  • Every single day, TitanHQ identifies 100,000 NEW malicious threats and URLs.  
  • Real-Time categorization and malicious detection for domains, full-path URLs, and IP addresses.
  • Industry-leading ​99.9% Coverage​ and over ​99% Accuracy​ of ActiveWeb URLs & IPs 
  • 100%​ coverage of the top 1 million most visited websites (ActiveWeb) 
  • Highly granular categories, which include malicious, objectionable, and topic-based groups 
  • 10​ ​Malicious​ categories, including Botnet, Phishing/Fraud, Malware Distribution Point, Command and Control, Cryptocurrency Mining, Ad Fraud, and more. 
  • Malicious URLs are revisited daily to determine if they are still infected, abandoned, or cleaned. This ensures that our malicious database stays as “fresh” and accurate as possible. 
  • Support for over ​200 ​languages.
  • Real-time continuous updates​ provide up-to-the-minute protection against newly identified malicious sources.

Alternatives to ISO 27001 Accreditation

ISO 27001 is an international standard. However, there are alternatives to ISO 27001 accreditation. Some of these alternatives are as follows:

SOC2 (System and Organization Controls Type 2)

Targeted at service providers who store client data in the cloud. Based on the five Trust Services Criteria. Main geography – USA.

NIST CSF 2.0 (Cyber Security Framework)

A general framework consisting of a series of security best practices in implementing policies, processes, and measures to protect an organization against cyber-attacks. Main geography – USA.

ASD Essential Eight

Recommended for all businesses. Promotes three main objectives, each with security controls to detect, prevent, and respond to cyberattacks. Geography – Australia.

Cyber Essentials

A UK government initiative that provides guidelines for security. Targets all types and sizes of UK companies. Seen as a stepping stone to broader security standards, such as ISO 27001. Geography – UK

ESA UAE Information Assurance Standards (IAS)

IAS uses a threat-based approach to cyberattack mitigation. Like ISO27001, IAS is a continuous process to set in place controls to mitigate information security risks. Geography – UAE.

Hear from our Customers

The protection we needed for our church and school.

What do you like best about WebTitan Web Filter? Web Titan provides internet filtering for everyone that walks through our doors and connects to our WiFi or wired internet. It allows us to protect our students and guests from inappropriate websites and phishing schemes. Recommendations to others considering WebTitan Web Filter: WebTitan Web Filter is a complete filtering solution for churches, schools, and other organizations. It is relatively easy to administer and the reporting is excellent. What problems is WebTitan Web Filter solving and how is that benefiting you? Anyone who connected to our WiFi or wired internet could go anywhere or be blasted with any kind of inappropriate content. It allows us to protect our students and guests from harmful websites and ads.

Mark M.

Small-Business

WebTitan Integration with my Active Directory Server is a game changer for me

What do you like best about WebTitan Web Filter? I am able to set access policies that fit each user and fit different groups. I have a lot of control when used in conjunction with my router DNS settings and my Active Directory server. The age ranges using our computers is from 9 to 43 so being able to customize and group at the same time saves a tremendous amount of oversight effort and leaves enough flexibility to meet all our needs. What problems is WebTitan Web Filter solving and how is that benefiting you? Content filtering and managing available content during productivity hours.

Jason M.

Software Enginner

Simple to install and easy to configure, but still very powerful

What do you like best about WebTitan Web Filter? We had three requirements for a web gateway/proxy server: 1. It must be able to integrate with Active Directory to avoid users entering another set of credentials. 2. It must be possible to place users in specific groups of defined levels of access. 3. Reporting must be simple and clear to be able to provide feedback to management. WebTitan did all three of these with little hassle. Recommendations to others considering WebTitan Web Filter: Download the trial and install it. We had it up and running in under 2 hours from when we started the download. It is the best way to see if it will meet your needs. What problems is WebTitan Web Filter solving and how is that benefiting you? Users can spend a lot of time on websites that results in WAN connections to be misused. With WebTitan we have much better control over this.

Ewert S.

Engineering Manager

Excellent Product

What do you like best about WebTitan Web Filter? Very easy setup - 5 minutes to configure. Detailed reporting. Easy to use. Very good support. What problems is WebTitan Web Filter solving and how is that benefiting you? Filtering websites for malicious URL's.

Shlomi F.

VP Sales & Business Development

Very strict service when set up properly

What do you like best about WebTitan Web Filter? I have a feeling of comfort knowing that users are not able to get to compromised websites, and NSFW websites as well. It blocks everything! Sometimes a little too much if that is such a thing, haha. Recommendations to others considering WebTitan Web Filter: If you have a VM, install their OS on your box to help with even more filtering! What problems is WebTitan Web Filter solving and how is that benefiting you? No breach into our system at all since the installation of WebTitan Web Filter (Hybrid) I also know that users cannot access things they shouldn't be accessing as well.

Josh F.

IT Administrator

Susan Morrow

Susan Morrow

  • DNS FILTERING
  • WEB FILTERING
  • CONTENT FILTERING

Talk to our Team today

Talk to our Team today

Frequently Asked Questions (FAQs)

Wherever possible, choose cloud-based control technologies. Using a cloud-hosted solution typically provides a centralized console that allows an organization (or MSP) to deploy, configure, administer, and manage the solution. WebTitan web filtering for ISO 27001 is cloud-based.

Yes, DNS filtering meets Annex A Control 8.23 Web Filtering, as this is a form of web filtering. However, you should choose a DNS filter that uses advanced technologies, such as machine learning, to ensure that your organization can keep ahead of the evolving threat landscape.

URL filtering comes under the umbrella term of web filtering. As such, compliant web filters, such as WebTitan, that include URL filtering, help an organization to meet the ISO 27001 Annex A Control 8.23 Web Filtering.

Yes, content filtering is a broad term that comes under web filtering. Content filtering prevents employees and others from accessing inappropriate or dangerous websites. This capability enables a content filter to help an organization meet ISO 27001 requirements.

ISO 27001 is an international standard, but it is not a legal requirement. However, going through ISO27001 certification ensures that your organization reduces the risk of cyberattacks, including data breaches, ransomware infection, and other malware infections. By being accredited to ISO 27001 or another alternative security framework, your organization can apply for tenders that require this security standard to be met. ISO27001 accreditation demonstrates to clients, customers, and others that your company uses best practice security measures.