A system administrator installs a new monitoring tool on a production database server. The tool works well — but it also opens a network port that bypasses the firewall rules. Three weeks later, a scanner finds the open port and reports it as a critical finding. A.8.19 requires a formal process for installing software on operational systems — testing before deployment, authorization and rollback capability.
Uncontrolled software installation on production systems introduces vulnerabilities, compatibility issues and unauthorized functionality. This control ensures that only tested, approved software reaches operational environments.
What does the standard require?
- Restrict installation authority. Only trained, authorized administrators may install software on operational systems.
- Install only approved software. Software must be tested and formally approved before installation on production systems.
- Test before deployment. Verify compatibility, security and functionality in a test environment before installing on production.
- Define rollback procedures. If an installation causes problems, a documented rollback process must exist.
- Log all installations. Record what was installed, when, by whom and which version.
- Manage software lifecycle. Track installed software versions, assess risks of unsupported or end-of-life software and plan migration.
In practice
Maintain an approved software list. Create and regularly update a catalogue of approved software for each system type. Software not on the list requires a formal request, security assessment and approval before installation.
Use centralized deployment tools. Deploy software through SCCM, Intune, Ansible or similar tools. This ensures consistent versions, automatic logging and the ability to roll back across the entire fleet.
Test in a staging environment. Before any production deployment, test the software in a staging environment that mirrors production. Verify functionality, check for conflicts with existing software and run vulnerability scans.
Monitor for unauthorized installations. Use endpoint management tools to detect software installed outside the approved process. Flag unauthorized installations for review and remediation.
Typical audit evidence
Auditors typically expect the following evidence for A.8.19:
- Software installation policy — documented rules for approval, testing and deployment (see IT Operations Policy in the Starter Kit)
- Approved software list — current catalogue of approved software
- Installation logs — records of software installed on production systems
- Test evidence — documentation of pre-production testing
- Lifecycle inventory — list of installed software with version, support status and end-of-life dates
KPI
Percentage of operational systems with enforced software installation policy
Measured as a percentage: how many production systems restrict software installation to authorized administrators with logging enabled? Target: 100%.
Supplementary KPIs:
- Number of unauthorized software installations detected per month
- Percentage of installed software that is within active support lifecycle
- Mean time from software request to approved deployment
BSI IT-Grundschutz
A.8.19 maps to BSI modules for software management:
- APP.6 (General Software) — requirements for managing software throughout its lifecycle, including approval, installation and decommissioning.
- OPS.1.1.6 (Software Testing and Approval) — testing and formal approval before production deployment.
- OPS.1.1.3 (Patch and Change Management) — software installation as part of the change management process.
Related controls
- A.8.8 — Management of Technical Vulnerabilities: Vulnerability management depends on knowing what software is installed.
- A.8.9 — Configuration Management: Software installation changes the system configuration.
- A.8.32 — Change Management: Every software installation is a change.
Sources
- ISO/IEC 27001:2022 Annex A, Control A.8.19 — Installation of software on operational systems
- ISO/IEC 27002:2022 Section 8.19 — Implementation guidance for installation of software on operational systems
- BSI IT-Grundschutz, APP.6 — General Software