Agency|Insights
Trust BuildingCompliance Operations

Firewall Requirements for ISO 27001 Compliance

ISO 27001 firewall requirements covering relevant Annex A controls, firewall types, rule management, change control, logging and monitoring, evidence requirements, and common audit findings.

Agency Team
Agency Team
·12 min read
Typographic card for Firewall Requirements for ISO 27001 Compliance in Compliance Operations

One of the things we hear regularly from engineering teams going through ISO 27001 certification is: "We already have firewalls in place — aren't we covered?" What we tell them is that having firewalls deployed is only half the story. ISO 27001 does not just ask whether you have network security controls; it asks whether those controls are governed, documented, monitored, and managed through a defined process. In our experience, the gap between "we have firewalls" and "our firewalls satisfy ISO 27001" is almost always a governance gap, not a technology gap. The firewall technology is usually adequate. The rule documentation, change control procedures, logging configuration, and periodic review processes are where organizations fall short.

This guide covers ISO 27001 firewall requirements, including the relevant Annex A controls, firewall types and their compliance implications, rule management, change control for firewall rules, logging and monitoring requirements, evidence collection for auditors, and the most common audit findings we see.

Relevant Annex A Controls

ISO 27001:2022 addresses network security through several Annex A controls. What we tell clients is that firewall implementation spans multiple controls, and your documentation and evidence must address each one.

A.8.20 — Network Security

This is the primary control for firewall requirements. A.8.20 requires that networks and network devices are secured, managed, and controlled to protect information in systems and applications. For firewalls, this means:

A.8.20 RequirementFirewall Implementation
Networks are managed and controlledFirewall rules define what traffic is permitted and denied across network boundaries
Information in transit is protectedFirewalls enforce encryption requirements for traffic crossing network boundaries
Network devices are securedFirewall devices themselves are hardened, patched, and access-controlled
Appropriate authentication for connectionsFirewalls enforce authentication requirements for inbound connections

A.8.21 — Security of Network Services

A.8.21 requires that security mechanisms, service levels, and service requirements for network services are identified, implemented, and monitored. This applies to firewall services whether self-managed or provided by a cloud platform.

What we recommend is documenting how your firewall services (whether cloud-native security groups, managed firewall appliances, or WAF services) are configured, who is responsible for them, and how they are monitored. If you use a managed firewall service, the service level agreement and security responsibilities should be documented.

A.8.22 — Segregation of Networks

A.8.22 requires that groups of information services, users, and information systems are segregated in the organization's networks. Firewalls are the primary mechanism for network segregation, and this control directly addresses the architecture of your firewall rules.

Segregation RequirementFirewall Implementation
Production separated from developmentFirewall rules prevent direct access between production and development environments
Internal services separated from public-facingWAF and network firewalls create boundary between public internet and internal services
Sensitive data zones isolatedFirewall rules restrict access to databases and sensitive data stores to authorized services only
Management networks separatedAdministrative access to infrastructure is restricted to management networks or VPN

Additional Relevant Controls

ControlFirewall Relevance
A.8.9 — Configuration managementFirewall configurations must be managed, documented, and controlled
A.8.16 — Monitoring activitiesFirewall logs must be monitored for security events
A.8.15 — LoggingFirewall events must be logged with sufficient detail
A.5.1 — Policies for information securityNetwork security policy must include firewall governance
A.8.32 — Change managementChanges to firewall rules must follow a defined change management process

Firewall Types and Compliance Implications

Network Firewalls

Network firewalls control traffic at the network layer based on IP addresses, ports, and protocols. In our experience, most organizations pursuing ISO 27001 use cloud-native network firewalls as their primary network security control.

PlatformNetwork FirewallHow It Works
AWSSecurity Groups + Network ACLsSecurity Groups are stateful, instance-level firewalls; NACLs are stateless, subnet-level firewalls
AzureNetwork Security Groups (NSGs)Stateful, can be applied to subnets or individual network interfaces
GCPVPC Firewall RulesStateful rules applied at the VPC network level; can target instances by tags or service accounts
On-premisesHardware firewalls (Palo Alto, Fortinet, Cisco)Physical or virtual appliances deployed at network boundaries

What we tell clients is that cloud-native firewalls satisfy ISO 27001 requirements when they are properly configured, documented, and governed. You do not need to deploy third-party firewall appliances in a cloud environment unless your risk assessment identifies a specific need.

Web Application Firewalls (WAF)

WAFs operate at the application layer (Layer 7) and protect web applications from attacks like SQL injection, cross-site scripting, and other OWASP Top 10 vulnerabilities. In our experience, WAF is increasingly expected by ISO 27001 auditors for organizations with public-facing web applications.

WAF SolutionPlatformKey Capabilities
AWS WAFAWSManaged rules, custom rules, rate limiting, bot control; integrates with CloudFront, ALB, API Gateway
Azure WAFAzureManaged rule sets (OWASP), custom rules; integrates with Application Gateway, Front Door
Cloudflare WAFMulti-cloudManaged rules, custom rules, rate limiting, bot management; operates at the CDN/edge layer
GCP Cloud ArmorGCPDDoS protection, WAF rules, adaptive protection; integrates with Cloud Load Balancing

Cloud-Native Firewalls

Cloud-native firewalls are the advanced network security services offered by cloud providers that go beyond basic security groups.

ServiceProviderUse Case
AWS Network FirewallAWSStateful and stateless traffic inspection for VPCs; IDS/IPS capabilities
Azure FirewallAzureManaged, stateful firewall with built-in high availability; threat intelligence-based filtering
GCP Cloud NGFWGCPNext-generation firewall with threat detection and TLS inspection

What we recommend is matching your firewall architecture to your actual risk profile. For most SaaS companies, cloud-native security groups plus a WAF provide adequate network security. For organizations handling highly sensitive data or subject to additional regulatory requirements, cloud-native advanced firewalls or third-party solutions may be appropriate.

Firewall Rule Management

The Principle of Least Privilege

What we tell clients is that ISO 27001 expects your firewall rules to follow the principle of least privilege: deny all traffic by default and permit only what is explicitly required. This seems straightforward, but in our experience, firewall rule sets accumulate exceptions over time and gradually drift from least-privilege to permissive.

Rule Documentation Requirements

ISO 27001 auditors expect firewall rules to be documented and justified. Every rule should be traceable to a business or technical requirement.

Rule Documentation ElementWhat It ContainsWhy Auditors Need It
Rule purposeBusiness or technical justification for the ruleValidates that the rule is necessary
Source and destinationSpecific IP ranges, security groups, or tagsValidates that the rule follows least privilege
Ports and protocolsSpecific ports and protocols permittedValidates that the rule is not overly permissive
Rule ownerPerson or team responsible for the ruleEstablishes accountability for rule review
Creation dateWhen the rule was createdSupports periodic review and identifies stale rules
Review dateWhen the rule was last reviewedValidates that periodic review is occurring
Expiration dateWhen the rule should be reconsidered or removedPrevents permanent exceptions from accumulating

Periodic Rule Review

What we recommend is a quarterly firewall rule review where each rule is evaluated for continued necessity. In our experience, organizations that do not conduct periodic reviews end up with firewall configurations that include rules for decommissioned services, overly broad temporary rules that were never tightened, and rules that no one can explain.

Review ActivityFrequencyResponsible Party
Review all firewall rules for continued necessityQuarterlyNetwork security team or infrastructure lead
Identify and remove stale rulesQuarterlyNetwork security team with rule owners
Verify least-privilege alignmentQuarterlySecurity team
Full firewall architecture reviewAnnuallySecurity team with management review
Review after significant infrastructure changesAs neededChange management process

Change Control for Firewall Rules

Why Change Control Matters

ISO 27001 control A.8.32 requires that changes to information processing facilities and systems are subject to change management procedures. Firewall rule changes directly affect your security posture, and uncontrolled changes are one of the most common sources of security incidents.

Change Control Process

What we recommend for firewall rule changes:

StepActionEvidence Generated
1. Change requestRequester submits a change request documenting the rule change, business justification, and risk assessmentChange request ticket in your change management system
2. Security reviewSecurity team reviews the proposed rule change for compliance with firewall policy and least-privilege principleSecurity review approval in the change request
3. ApprovalChange approved by authorized personnel (typically security lead or infrastructure manager)Approval record in the change management system
4. ImplementationRule change is implemented in a controlled manner, ideally through infrastructure-as-codeImplementation record; IaC commit in version control
5. VerificationVerify the rule change works as intended and does not create unintended accessTest results documented in the change request
6. DocumentationUpdate firewall rule documentation with the new or modified ruleUpdated rule documentation

Infrastructure as Code for Firewall Rules

In our experience, the most effective approach to firewall change control is managing firewall rules through infrastructure-as-code (IaC) tools like Terraform, CloudFormation, or Pulumi. This provides:

  • Version control. Every firewall rule change is a tracked commit in your code repository.
  • Review process. Pull request reviews serve as the security review step.
  • Audit trail. Complete change history with who changed what and when.
  • Rollback capability. Previous configurations can be restored quickly.
  • Drift detection. Automated checks identify when deployed rules differ from defined configuration.

What we tell clients is that IaC for firewall management is not just a best practice — it is the most efficient way to satisfy ISO 27001 change control requirements for network security, because the evidence is generated automatically through your normal development workflow.

Logging and Monitoring

Logging Requirements

ISO 27001 control A.8.15 requires that logs recording activities, exceptions, faults, and other relevant events are produced, stored, protected, and analyzed. For firewalls, this means capturing sufficient log data to detect security events and support incident investigation.

Log TypeWhat to CaptureRetention
Allowed traffic logsSource, destination, port, protocol, timestamp for permitted connections90 days minimum; 12 months recommended
Denied traffic logsSource, destination, port, protocol, timestamp for blocked connections90 days minimum; 12 months recommended
Rule change logsWho changed what rule, when, and from what source12 months minimum
Administrative access logsWho accessed firewall management, what actions they took12 months minimum
Alert logsSecurity alerts generated by firewall or IDS/IPS12 months minimum

Monitoring Requirements

ISO 27001 control A.8.16 requires that networks, systems, and applications are monitored for anomalous behavior and appropriate actions taken to evaluate potential information security incidents. For firewalls, this means actively monitoring firewall logs, not just storing them.

Monitoring ActivityPurposeImplementation
Denied traffic analysisDetect scanning, brute force, or reconnaissance activitySIEM rules alerting on high volumes of denied traffic from single sources
Unusual permitted trafficDetect data exfiltration or lateral movementSIEM rules for unusual traffic volumes or connections to unexpected destinations
Rule change monitoringDetect unauthorized firewall modificationsAlert on firewall rule changes outside of change management windows
Firewall health monitoringEnsure firewall services are operationalUptime monitoring for firewall services; alert on service degradation

What we recommend is centralizing firewall logs in a SIEM or log management platform (AWS CloudWatch, Datadog, Splunk, or similar) and configuring alert rules for the monitoring activities above. In our experience, auditors specifically ask whether firewall logs are monitored, not just stored.

Evidence Requirements for Auditors

What to Have Ready

In our experience, ISO 27001 auditors evaluating firewall controls ask for the following evidence:

EvidenceSourceFormat
Network security policyPolicy management systemPDF with approval date and version
Firewall architecture diagramNetwork documentationDiagram showing firewall placement, network zones, and trust boundaries
Current firewall rule setCloud console, IaC repository, or firewall management platformExport of current rules with documentation
Rule review recordsChange management system or review logRecords of quarterly rule reviews with findings and actions
Change management recordsTicketing system or IaC commit historySample of firewall change requests with approval chain
Firewall logsSIEM or log management platformLog samples and retention configuration
Monitoring alert configurationSIEM or monitoring platformAlert rules and escalation procedures
Incident recordsIncident management systemRecords of firewall-related security events and response

Demonstrating Continuous Improvement

What we tell clients is that ISO 27001 auditors appreciate evidence of continuous improvement in firewall management. This includes:

  • Metrics showing reduction in stale firewall rules over time
  • Records of firewall rules tightened during periodic reviews
  • Evidence that findings from previous audits have been remediated
  • Documentation of firewall architecture improvements aligned with risk assessment updates

Common Audit Findings

What We See Most Frequently

In our experience working with ISO 27001 clients, these are the firewall-related findings that auditors raise most often:

FindingRoot CauseHow to Prevent
Overly permissive rules (0.0.0.0/0 inbound)Convenience during development; rules never tightened for productionReview all rules before going to production; flag any rule permitting traffic from all sources
No periodic rule reviewRule review not scheduled or treated as a prioritySchedule quarterly reviews; assign ownership; track completion
Firewall changes without change controlRules modified directly in console without documentation or approvalEnforce IaC for firewall rules; restrict console access; require pull request reviews
Insufficient loggingDefault logging disabled or set to minimal; logs not centralizedEnable comprehensive logging; centralize in SIEM; verify log retention meets policy
Missing network segregationFlat network architecture where all services can communicate directlyImplement network segmentation; use separate subnets/VPCs for different trust zones
Stale rules for decommissioned servicesServices removed but firewall rules remainInclude firewall rule cleanup in service decommissioning checklists
No WAF for public-facing applicationsWAF not deployed or not properly configuredDeploy WAF for all public-facing web applications; configure managed rule sets
Undocumented firewall rulesRules exist without business justification or documentationRequire documentation for every rule; enforce through IaC and pull request templates

Severity of Findings

What we tell clients is that not all firewall findings carry the same weight in an ISO 27001 audit:

SeverityExamplesImpact on Certification
Major nonconformityNo firewall in place; no change control for network security changes; no logging of firewall eventsCan prevent certification until remediated
Minor nonconformityIncomplete rule documentation; periodic review not consistently performed; some stale rules presentMust be addressed with a corrective action plan; does not prevent certification
Observation / opportunity for improvementWAF not deployed for all applications; logging retention below recommended period; IaC not yet adoptedNoted for future improvement; no immediate action required

Key Takeaways

  • What we tell clients is that ISO 27001 firewall compliance is primarily a governance challenge, not a technology challenge — the relevant Annex A controls (A.8.20, A.8.21, A.8.22) require that firewalls are not just deployed but managed, documented, monitored, and subject to change control
  • In our experience, cloud-native firewalls (AWS Security Groups, Azure NSGs, GCP firewall rules) satisfy ISO 27001 requirements when properly configured and governed — you do not need third-party firewall appliances in a cloud environment unless your risk assessment identifies a specific need
  • What we recommend is managing firewall rules through infrastructure-as-code, which automatically generates the change control evidence that auditors require: version history, review records, approval chain, and rollback capability
  • In our experience, the most common firewall audit findings are overly permissive rules, missing periodic reviews, firewall changes made without change control, and insufficient logging — all of which are preventable through defined processes and automation
  • What we tell clients about firewall logging is that storing logs is not enough — ISO 27001 requires monitoring, which means your firewall logs must flow to a SIEM or monitoring platform with alert rules configured for security-relevant events
  • We help our clients build firewall governance programs that satisfy ISO 27001 auditors by combining cloud-native firewall technology with the policy documentation, change control processes, periodic reviews, and monitoring capabilities that turn deployed firewalls into auditable controls
Agency Team

Agency Team

Agency Insights

Expert guidance on cybersecurity compliance from Agency's advisory team.

LinkedIn

Related Reading

Stay ahead of compliance

Expert insights on cybersecurity compliance delivered to your inbox.

We respect your privacy. Unsubscribe anytime.