Two identical web servers running the same service — yet with different TLS versions, different firewall rules and different logging settings. One was set up manually two years ago, the other last week. A.8.9 requires that configurations for hardware, software, services and networks are documented, standardized and protected against unauthorized changes.
Configuration drift — the gradual divergence of configurations over time — is one of the most common security problems in IT environments. This control ensures systems remain securely configured throughout their entire lifecycle.
What does the standard require?
- Define standard configurations. For each system type, a documented baseline exists based on vendor recommendations and security best practices.
- Update baselines regularly. Baselines are reviewed and updated when new threats, software versions or organizational changes occur.
- Control changes. Configuration changes follow the change management process and are logged.
- Monitor compliance. Tools monitor systems for deviations from the baseline and report them automatically.
- Protect configuration data. The configurations themselves are protected against unauthorized access — they often contain security-sensitive details.
In practice
Create configuration baselines per system type. For each type (Windows server, Linux server, network switch, firewall, cloud service) create a separate baseline. Use CIS Benchmarks or vendor recommendations as a foundation, supplemented with organization-specific requirements.
Implement configuration as code. Define configurations as code (Ansible playbooks, Terraform modules, Chef cookbooks). This makes the baseline versioned, testable and reproducible. Manual configuration changes become the exception.
Set up automated compliance checking. Tools like Ansible, InSpec or cloud-native services (AWS Config, Azure Policy) continuously verify whether systems conform to the baseline. Deviations trigger automatic alerts or corrections.
Maintain a configuration management database (CMDB). The CMDB documents the target configuration for each system and the current actual state. It forms the basis for deviation reports and audit evidence.
Typical audit evidence
Auditors typically expect the following evidence for A.8.9:
- Configuration baselines — documented target configurations per system type (see Configuration and Change Management Policy in the Starter Kit)
- Compliance reports — evidence of target-actual comparison
- Change logs — evidence that configuration changes follow the change process
- CMDB extract — current documentation of system configurations
- Baseline review records — evidence of regular baseline updates
KPI
Percentage of systems with documented and verified security configurations
Measured as a percentage: how many of your systems have a documented baseline and pass the automated compliance check? Target: above 95%.
Supplementary KPIs:
- Number of configuration deviations per month (target: decreasing)
- Mean time between deviation detection and correction
- Percentage of system types with a current baseline (target: 100%)
BSI IT-Grundschutz
A.8.9 maps to several BSI modules for IT operations and hardening:
- OPS.1.1.1 (General IT Operations) — requirements for documenting and managing system configurations, regular review and protection against unauthorized changes.
- CON.8 (Software Development) — configuration management in the development context, versioning of configurations.
- SYS.1.1 (General Server) — specific hardening requirements for server configurations.
- NET.3.1/NET.3.2 (Routers and Switches, Firewalls) — configuration management for network devices.
Related controls
- A.8.8 — Management of Technical Vulnerabilities: Secure configuration and patch management complement each other in protecting against attacks.
- A.8.32 — Change Management: Every configuration change is a change in the sense of change management.
- A.8.1 — User Endpoint Devices: The endpoint baseline is a special case of the configuration baseline.
Sources
- ISO/IEC 27001:2022 Annex A, Control A.8.9 — Configuration management
- ISO/IEC 27002:2022 Section 8.9 — Implementation guidance for configuration management
- BSI IT-Grundschutz, OPS.1.1.1 — General IT Operations