Skip to content
arrow_back
search
Annex A 8.9 verified ISO/IEC 27001:2022

Configuration Management for Secure IT Systems

Set and keep secure settings for all IT systems and watch for changes.

record_voice_over

Plain language

Configuration management ensures that all the settings for your computers, software, and networks are planned and kept secure, reducing the chance of unexpected changes that could lead to security problems. Without this, systems can become vulnerable to attacks or operate inefficiently due to unauthorised or incorrect changes.

Framework

ISO/IEC 27001:2022

Control effect

Preventative

ISO 27001 domain

Technological controls

Classifications

N/A

Official last update

24 Oct 2022

Control Stack last updated

30 Mar 2026

Maturity levels

N/A

Official control statement

Configurations, including security configurations, of hardware, software, services and networks shall be established, documented, implemented, monitored and reviewed.
verified ISO/IEC 27001:2022 Annex A 8.9
priority_high

Why it matters

Poor configuration management leaves systems open to attacks and operational errors, risking company data and service disruptions.

settings

Operational notes

Regularly monitor systems for baseline compliance and adjust settings when introducing new technology to prevent drift and minimise risks.

Mapping detail

Mapping

Direction

Controls