The primary database server fails at 2 AM. The failover database — supposedly in hot standby — has not replicated for three days due to a silent synchronization error. The recovery takes twelve hours instead of the expected fifteen minutes. A.8.14 requires that redundancy is planned, implemented and tested — because untested redundancy is indistinguishable from no redundancy.
The control ensures continuous operation by requiring organizations to identify availability needs and implement appropriate redundancy — from duplicate components to geographically separated systems.
What does the standard require?
- Identify availability requirements. Determine the availability targets for each business service and underlying system.
- Implement appropriate redundancy. Deploy redundant components (power supplies, network links, storage) or entire systems (active-passive clusters, multi-site deployments) based on availability targets.
- Enable failover. Define whether failover is automatic or manual, and document the failover procedure.
- Test redundancy regularly. Verify that failover works as expected through scheduled tests.
- Maintain security parity. Redundant systems must have the same security controls as primary systems.
In practice
Conduct a business impact analysis. For each business process, determine the maximum tolerable downtime and the required availability percentage. This drives your redundancy decisions: a 99.99% target demands fundamentally different architecture than 99%.
Implement redundancy at every layer. Eliminate single points of failure: dual power supplies, redundant network paths, clustered servers, replicated databases, multi-zone cloud deployments. Map your architecture and identify every component where a single failure causes an outage.
Automate failover where possible. Manual failover introduces delay and human error. Use load balancers, database replication with automatic promotion and cloud availability zones with auto-failover. Reserve manual failover for scenarios where automatic switching carries too much risk.
Schedule and document failover tests. Simulate failures (pull a network cable, stop a database node, fail a cloud zone) and verify that the system recovers within the expected timeframe. Document every test: date, scenario, expected outcome, actual outcome, corrective actions.
Typical audit evidence
Auditors typically expect the following evidence for A.8.14:
- Availability requirements — documented targets per system, derived from business impact analysis (see IT Operations Policy in the Starter Kit)
- Redundancy architecture — documentation showing redundant components and failover paths
- Failover test records — documented test results with timing and findings
- Uptime reports — actual availability metrics compared against targets
- Security parity evidence — proof that redundant systems have equivalent security controls
KPI
Percentage of critical processing facilities with tested redundancy measures
Measured as a percentage: how many critical systems have documented redundancy and a failover test completed within the last 12 months? Target: 100%.
Supplementary KPIs:
- Actual availability vs. target availability per critical system
- Mean time to failover (measured during tests)
- Number of unplanned outages caused by single points of failure
BSI IT-Grundschutz
A.8.14 maps to BSI modules for redundancy and business continuity:
- INF.2 (Data Centre) — redundancy requirements for data centre infrastructure: power, cooling, network connections.
- DER.4 (Emergency Management) — business continuity planning that drives redundancy requirements.
Related controls
- A.8.13 — Information Backup: Backups complement redundancy — redundancy for availability, backups for recovery.
- A.8.6 — Capacity Management: Redundant systems need sufficient capacity to absorb the additional load during failover.
- A.5.30 — ICT Readiness for Business Continuity: Business continuity planning that drives redundancy requirements.
Sources
- ISO/IEC 27001:2022 Annex A, Control A.8.14 — Redundancy of information processing facilities
- ISO/IEC 27002:2022 Section 8.14 — Implementation guidance for redundancy
- BSI IT-Grundschutz, INF.2 — Data Centre