An external auditor runs a vulnerability scan against the production database server at 10 AM on a Monday. The scan generates 50,000 requests in 30 seconds, triggering the intrusion detection system and causing the database connection pool to exhaust. The application returns errors to all users for 15 minutes. A.8.34 ensures that audit and assurance activities are planned and managed to minimize their impact on operational systems.
Audits are essential for verifying security. Poorly conducted audits can themselves cause security incidents or operational disruptions. This control balances the need for thorough audit testing with the need to protect production systems.
What does the standard require?
- Agree on scope and approach. Coordinate with management on what auditors can access, which systems they can test and what methods they may use.
- Prefer read-only access. Use read-only access to configuration files, logs and data wherever possible. Limit write access and intrusive testing.
- Protect audit tools. Ensure audit tools (scanners, data extraction software) are authorized, verified and removed after the audit.
- Schedule intrusive tests carefully. Activities that could affect system performance or availability should take place during maintenance windows.
- Monitor audit activities. Log all audit access and actions for accountability.
- Handle system files carefully. Protect critical system files during audits and control access to sensitive configuration data.
In practice
Create an audit coordination process. Assign a coordinator who manages audit access, scheduling and communication. Every audit engagement starts with a scoping meeting that defines what will be tested, how and when.
Grant time-limited, scoped access. Provide audit access through dedicated, temporary accounts with read-only permissions where possible. Revoke access immediately when the engagement ends. Log all activities through these accounts.
Schedule performance-impacting tests. Vulnerability scans, penetration tests and load tests on production systems should be scheduled during low-traffic periods. Notify operations and incident response teams in advance.
Verify and control audit tools. Before allowing auditors to deploy tools on your systems, verify the tools’ integrity and approve their use. Remove all audit tools and temporary accounts immediately after the engagement.
Typical audit evidence
Auditors typically expect the following evidence for A.8.34:
- Audit engagement protocol — documented procedures for managing audit access and activities (see Secure Software Development Policy in the Starter Kit)
- Access authorization records — evidence of time-limited, scoped audit access
- Schedule coordination — documented scheduling of intrusive tests
- Activity logs — evidence of monitoring audit access and actions
- Tool authorization records — approval and removal of audit tools
KPI
Percentage of audit tests conducted with documented IS protection measures
Measured as a percentage: how many audit engagements followed the documented audit engagement protocol with appropriate protection measures? Target: 100%.
Supplementary KPIs:
- Number of operational incidents caused by audit activities (target: zero)
- Mean time between audit engagement end and access revocation (target: under 24 hours)
- Percentage of audit engagements with documented scoping agreement
BSI IT-Grundschutz
A.8.34 maps to BSI modules for audit and assurance:
- ISMS.1 (Security Management) — overarching requirements for managing audit activities within the ISMS.
- DER.3.1/DER.3.2 (Audit and Revision) — specific requirements for planning, conducting and following up on information security audits.
Related controls
- A.8.32 — Change Management: Audit-related changes (temporary accounts, tool installations) should follow the change process.
- A.8.15 — Logging: Logging of all audit access and activities.
- A.5.35 — Independent Review of Information Security: The broader framework for independent security reviews.
Sources
- ISO/IEC 27001:2022 Annex A, Control A.8.34 — Protection of information systems during audit testing
- ISO/IEC 27002:2022 Section 8.34 — Implementation guidance for audit protection
- BSI IT-Grundschutz, DER.3.1 — Audit and Revision