Zum Hauptinhalt springen
Annex A · Technological Control

A.8.7 — Protection Against Malware

Updated on 4 min Reviewed by: Cenedril Editorial
A.8.7 ISO 27001ISO 27002BSI OPS.1.1.4

Ransomware encrypts 40,000 files in under four minutes. The initial infection came through a macro in an email attachment that the antivirus did not flag because the payload was less than a day old. A.8.7 demands a layered defence against malware — detection software alone is explicitly insufficient.

Modern malware evades signature-based detection, operates fileless in memory and spreads laterally within minutes. The control requires a combination of technical measures, user awareness and recovery capability.

What does the standard require?

  • Deploy detection and prevention software. Install anti-malware or EDR solutions on all endpoints and servers, with automatic updates.
  • Implement application control. Use whitelisting or application control to limit which software can execute.
  • Block known malicious sources. Filter web traffic and email to block known malicious domains, URLs and file types.
  • Scan regularly. Scan all files, email attachments and web downloads for malware. Perform scheduled full-system scans.
  • Train users. Ensure employees can recognize common malware delivery methods (phishing, malicious attachments, drive-by downloads).
  • Prepare for recovery. Maintain tested backup and recovery procedures to restore systems after a malware incident.

In practice

Deploy EDR across all endpoints and servers. Ensure coverage includes Windows, macOS and Linux systems. Configure automatic signature updates and behavioural detection. Integrate alerts into your SIEM or incident management workflow.

Implement application whitelisting on critical systems. On servers and kiosks, allow only approved applications to run. On workstations, consider a softer approach: block known malicious categories and alert on unknown executables.

Enable email and web filtering. Block executable attachments (EXE, SCR, BAT, PS1) in email. Filter web traffic to block known malicious domains. Use DNS-level filtering for an additional layer.

Conduct phishing simulations. Regular simulated phishing exercises train users to recognize and report suspicious messages. Track click rates over time and provide targeted training for repeat offenders.

Typical audit evidence

Auditors typically expect the following evidence for A.8.7:

  • Anti-malware policy — documented strategy covering detection, prevention and recovery (see Endpoint Security Policy in the Starter Kit)
  • EDR/AV coverage report — percentage of endpoints with active, current protection
  • Signature update logs — evidence of timely updates
  • Malware incident records — documented incidents with response and remediation details
  • Phishing simulation results — user awareness metrics over time

KPI

Percentage of endpoints with current and active anti-malware protection

Measured as a percentage: how many of your endpoints have an active EDR/AV agent with signatures updated within the last 24 hours? Target: 100%.

Supplementary KPIs:

  • Number of malware detections per month (trend analysis)
  • Phishing simulation click-through rate (target: below 5%)
  • Mean time to contain a malware incident

BSI IT-Grundschutz

A.8.7 maps to BSI modules for malware protection and incident handling:

  • OPS.1.1.4 (Protection Against Malware) — the core module. Requires anti-malware software on all IT systems, automatic updates, regular scans and user awareness.
  • DER.2.1 (Incident Management) — procedures for handling malware incidents, including containment, eradication and recovery.

Sources

Frequently asked questions

Is traditional antivirus software enough for A.8.7?

No. ISO 27002 explicitly states that relying solely on malware detection software is insufficient. The control requires a combination of technical measures (EDR, application whitelisting, web filtering), user awareness training and procedural controls.

Do we need anti-malware on Linux servers?

Yes, if those servers process, store or relay files that could affect other systems. A Linux file server distributing malware to Windows clients is a common attack scenario.

How quickly must malware signatures be updated?

ISO 27002 requires updates to be timely and frequent. In practice, this means automatic updates multiple times per day. Any delay beyond 24 hours is a finding waiting to happen.