Skip to content
AuditFront
A.8.23 ISO 27001

ISO 27001 A.8.23: Web filtering

What This Control Requires

Access to external websites shall be managed to reduce exposure to malicious content.

In Plain Language

Web-based attacks - phishing sites, drive-by downloads, malware distribution - remain one of the most common ways attackers get their initial foothold. This control (new in ISO 27001:2022) is about filtering access to external websites so your users are not one bad click away from a compromise.

Web filtering works through URL categorisation, reputation scoring, content inspection, and SSL/TLS inspection. The goal is to block known malicious sites while keeping the internet usable for legitimate work.

The trick is balance. Lock things down too aggressively and you frustrate people into finding workarounds (which are worse than no filtering at all). Focus on blocking genuinely dangerous categories and align the rest with your acceptable use policy.

How to Implement

Deploy a web filtering solution with URL categorisation and threat protection. Options include cloud-based secure web gateways (SWG), DNS-based filtering, on-premises web proxies, endpoint-based filtering, or browser security extensions. Whatever you choose, it must cover all users regardless of location - remote workers included.

Set up filtering policies that match your acceptable use policy. At minimum, block known malware and phishing sites, command-and-control domains, and newly registered domains (which are disproportionately used for attacks). Consider blocking or monitoring high-risk categories like file sharing sites, crypto mining sites, and anonymisation services.

Implement SSL/TLS inspection where legally and technically appropriate. Most malicious sites use HTTPS now, so without SSL inspection your filter is essentially blind to encrypted content. Work with legal to get the privacy considerations right and exempt sensitive categories (banking, healthcare) from inspection.

Make sure remote workers are covered. Cloud-based filtering that routes through a cloud proxy, DNS-based filtering that works on any network, or endpoint agents that function regardless of connection type all solve this problem.

Create a process for handling blocked-site requests. People will occasionally need access to something the filter catches. Give them a clear request mechanism, define an approval workflow that weighs risk against business need, and respond quickly. Slow responses drive workarounds.

Monitor and report on filtering activity. Track blocked requests by category and volume. Investigate patterns that suggest malware infections - repeated attempts to reach malicious sites are a red flag. Use the data to inform your security awareness training topics.

Evidence Your Auditor Will Request

  • Web filtering solution deployment and configuration documentation
  • Filtering policies showing blocked and allowed categories
  • Coverage records showing filtering applies to all users including remote workers
  • Blocked site exception request process and records
  • Web filtering activity reports and trend analysis

Common Mistakes

  • No web filtering solution deployed leaving users exposed to malicious sites
  • Web filtering only covers on-premises users while remote workers are unprotected
  • Filtering categories are too broad blocking legitimate business sites
  • No SSL inspection meaning encrypted malicious traffic is not inspected
  • No exception request process causing users to find workarounds to bypass filtering

Related Controls Across Frameworks

Framework Control ID Relationship
SOC 2 CC6.8 Partial overlap
NIS2 Art.21(2)(d) Partial overlap

Frequently Asked Questions

Is this control new in ISO 27001:2022?
Yes, it is one of the 11 new controls introduced in the 2022 revision. The standard now explicitly addresses web-based threats as a standalone requirement, reflecting how significant these attack vectors have become since the 2013 version.
Should we implement SSL/TLS inspection?
It makes a big difference to filtering effectiveness since the vast majority of web traffic is now encrypted. That said, there are real considerations: some jurisdictions restrict interception of encrypted traffic, there are privacy implications (especially if you allow personal use), certificate deployment can be fiddly, and there is a performance hit. Get legal advice, notify users, and exempt sensitive categories like banking and healthcare from inspection. But for general web browsing, the security benefit is substantial.

Track ISO 27001 compliance in one place

AuditFront helps you manage every ISO 27001 control, collect evidence, and stay audit-ready.

Start Free Assessment