top of page

ISO 27001 Annex A - Physical Controls Explored

The ISO 27001 Annex A Physical Controls


In the realm of information security, physical security often serves as the first line of defence in protecting an organisation’s critical assets.


Section 7 of Annex A in ISO 27001:2022, titled "Physical Controls," focuses on safeguarding the physical infrastructure that underpins an organisation’s information systems.



While much attention is often given to digital and cyber threats, the importance of securing the physical environment cannot be overstated. These controls protect against unauthorised access, damage, or interference with facilities, equipment, and information assets, ensuring the organisation’s operational integrity remains intact.


The controls in this section encompass a comprehensive range of measures aimed at fortifying the physical premises—from establishing secure perimeters and controlling access to sensitive areas to monitoring for unauthorised activities and protecting against environmental threats such as fire or flooding. These measures are crucial not only for preventing theft, vandalism, or sabotage but also for mitigating the impact of natural disasters and ensuring business continuity.


By implementing robust physical controls, organisations can significantly reduce the risk of physical security breaches that could lead to losing, compromising, or destroying vital information and systems.

The controls outlined in Section 7 address every aspect of physical security, including the management of secure areas, the protection of equipment and off-site assets, and the secure disposal of media and devices. The measures ensure that all physical components of the organisation’s information infrastructure are protected against intentional and accidental threats.


Section 7 emphasises the importance of integrating physical security into the overall information security strategy, recognising that a comprehensive approach to security must include both technological and physical safeguards.


By adhering to these controls, organisations can create a secure environment that supports the confidentiality, integrity, and availability of their information assets while also ensuring the safety of their personnel and facilities.


 

7.1 Physical Security Perimeters


Purpose

Physical security perimeters are crucial for defining and protecting areas within an organisation that contain sensitive information and critical assets.


Establishing perimeters ensures that only authorised personnel can access these areas, thereby reducing the risk of physical security breaches, theft, or damage to critical assets.


Implementation

To implement this control, organisations should first identify areas that require heightened security, such as server rooms, data centres, or executive offices. These areas should be secured using barriers such as walls, fences, or locked doors, and entry should be controlled through access mechanisms like keycards, biometric scanners, or security personnel.


Signage should clearly mark the boundaries of secure areas, and surveillance systems like CCTV should be installed to monitor access points. These perimeters should be regularly assessed to identify and address any vulnerabilities.

 

7.2 Physical Entry


Purpose

Controlling physical entry to secure areas is essential for preventing unauthorised access to sensitive information and assets. This control focuses on implementing appropriate entry controls to ensure that only individuals with the necessary authorisation can enter secure areas.


Implementation

Organisations should establish entry points equipped with access control systems such as keycard readers, biometric scanners, or PIN codes. To implement effective physical entry controls, these systems should be integrated with an access management system that records and monitors who enters and exits secure areas.


Security personnel may also be stationed at entry points to verify identities and provide an additional layer of control.


Regular audits should be conducted to ensure that access permissions are up-to-date and that entry controls are functioning as intended. In the event of a security breach, procedures should be in place to quickly restrict access and investigate the incident.

 

7.3 Securing Offices, Rooms, and Facilities


Purpose

This control ensures that physical security measures are implemented to protect offices, rooms, and facilities where sensitive information is stored or processed.


The objective is to prevent unauthorised access, tampering, or damage to these areas, safeguarding the organisation’s critical assets.


Implementation

To secure offices, rooms, and facilities, organisations should implement a combination of physical security measures tailored to the specific risks associated with each area. This may include installing robust locks on doors, using reinforced walls and windows, and deploying security cameras to monitor activity.


Access to these areas should be restricted based on the sensitivity of the information or assets stored within, and entry should be granted only to authorised personnel.


Additional measures, such as intrusion detection systems or alarm systems, can be used to enhance security.


These security measures should be regularly inspected and maintained to ensure their effectiveness.

 

7.4 Physical Security Monitoring


Purpose

Continuous monitoring of premises for unauthorised physical access is vital for detecting and responding to security incidents in real-time. This control focuses on implementing monitoring systems that provide constant surveillance of secure areas to prevent and address unauthorised access.


Implementation

Organisations should install surveillance systems such as CCTV cameras at key locations within and around secure areas to implement this control. These cameras should be positioned to cover all entry points, critical infrastructure, and areas where sensitive information is stored or processed.


The surveillance footage should be continuously monitored by security personnel or through automated systems capable of detecting unusual activities.


The organisation should also implement intrusion detection systems that alert security teams in case of unauthorised access.


Regular checks should be conducted to ensure that all monitoring equipment is functioning properly, and recorded footage should be securely stored for later review if needed.

 

7.5 Protecting Against Physical and Environmental Threats


Purpose

This control is aimed at safeguarding the organisation’s infrastructure from physical and environmental threats, such as natural disasters, fire, flooding, or intentional sabotage.


Ensuring that facilities are protected against these threats is critical for maintaining information and systems' availability, integrity, and confidentiality.


Implementation

To protect against physical and environmental threats, organisations should conduct a risk assessment to identify potential hazards to their facilities.


Based on this assessment, appropriate protective measures, such as fire suppression systems, flood barriers, or seismic reinforcements, should be implemented.


Environmental monitoring systems, such as smoke detectors, temperature sensors, and humidity controls, should be installed to detect and mitigate real-time risks.


The organisation should also develop and test emergency response plans to ensure that personnel know how to react in case of a disaster.


Regular maintenance and testing of all protective systems are essential to ensure they are ready to function effectively when needed.

 

7.6 Working in Secure Areas


Purpose

Security measures for working in secure areas are necessary to ensure that activities conducted within these areas do not compromise the organisation’s security. This control addresses the need for specific protocols and procedures when handling sensitive information or equipment in secure environments.


Implementation

Organisations should develop and enforce strict security protocols for personnel working in secure areas to implement this control. These protocols may include rules for using electronic devices, guidelines for discussing sensitive information, and restrictions on bringing or removing materials from the secure area.


Employees should be trained on these protocols and maintaining security while working in these environments.


The organisation should also implement measures to monitor activities within secure areas, such as access logs and surveillance systems, to detect any suspicious behaviour.


Regular audits should be conducted to ensure compliance with security protocols, and any violations should be addressed promptly.

 

7.7 Clear Desk and Clear Screen


Purpose

Clear desk and clear screen policies are essential for preventing unauthorised access to sensitive information, especially in environments where multiple personnel may have access to the same space. This control ensures that confidential information is not left unattended or visible on screens when not in use.


Implementation

To implement clear desk and screen policies, organisations should establish guidelines that require employees to clear their desks of all papers, storage media, and devices at the end of each workday or when leaving their workspace unattended.


Similarly, employees should be required to lock their computers and ensure that no sensitive information is visible on their screens when stepping away. These policies should be communicated to all employees and reinforced through regular reminders and training.


To support these policies, the organisation should also implement technical controls, such as automatic screen locking and encryption of data on removable storage media.


Regular inspections should be conducted to ensure compliance with clear desk and clear screen policies, and violations should be addressed through disciplinary actions if necessary.

 

7.8 Equipment Siting and Protection


Purpose


Proper siting and protection of equipment are crucial for ensuring the physical security of information processing systems and the data they handle. This control focuses on placing equipment securely and protecting it from physical damage or unauthorised access.


Implementation


Organisations should carefully select locations for equipment such as servers, networking devices, and storage systems to implement this control, ensuring that these areas are secure and not easily accessible to unauthorised personnel.


Equipment should be placed in areas protected from environmental hazards, such as extreme temperatures, humidity, or water damage.


To further protect critical equipment, physical security measures, such as locked cabinets, cages, or server racks, should be used.


Additionally, access to these areas should be restricted and monitored, and logs of all individuals who enter or exit should be maintained.


Regular checks should ensure that equipment remains securely sited and protected from physical and environmental threats.

 

7.9 Security of Assets Off-Premises


Purpose

This control addresses the need to protect organisational assets used or stored off-premises, such as laptops, mobile devices, or storage media taken outside the organisation’s physical locations.


Ensuring the security of these assets is essential to prevent data breaches, loss, or theft when assets are removed from the controlled environment.


Implementation

To secure off-premises assets, organisations should establish policies that govern the use, storage, and transportation of these assets outside the organisation’s facilities.


Employees should be required to use encryption for data stored on mobile devices and laptops and employ secure methods of transportation, such as protective cases or secure couriers.


Remote wipe capabilities should be implemented to allow the organisation to erase data from lost or stolen devices.


Employees should also be trained on the risks associated with taking assets off-premises and the security measures they must follow to protect these assets.


Regular audits should be conducted to ensure that all off-premises assets are accounted for and that security policies are being followed.

 

7.10 Storage Media


Purpose

The management of storage media is critical for ensuring that data stored on these media is protected throughout its lifecycle, from acquisition to disposal. This control focuses on securely handling, transporting, and disposing of storage media to prevent unauthorised access, data breaches, or information loss.


Implementation

Organisations should implement a classification scheme to manage storage media securely. This scheme determines how different types of media should be handled based on the sensitivity of the data they contain.


Procedures should be established for secure media transportation, including encryption and secure carriers.


When media is no longer needed, it should be disposed of securely, either by physical destruction or by using data wiping techniques that ensure data cannot be recovered.


The organisation should maintain an inventory of all storage media and regularly audit this inventory to ensure that all media are accounted for and handled according to the established procedures.


Employees should be trained on properly handling and disposing of storage media to prevent accidental data leaks or breaches.

 

7.11 Supporting Utilities


Purpose


Supporting utilities, such as power, water, and climate control systems, are essential for maintaining the functionality of information processing facilities. This control ensures that these utilities are protected from failures that could disrupt operations or compromise the security of information systems.


Implementation


To implement this control, organisations should assess the reliability of the utilities that support their information processing facilities and take steps to mitigate the risk of utility failures. This may include installing uninterruptible power supplies (UPS) and backup generators to ensure continuous power supply, implementing redundant cooling systems to maintain appropriate temperatures, and securing water supplies to prevent flooding or contamination.


The organisation should also establish monitoring systems to detect issues with supporting utilities and develop contingency plans for responding to utility failures.


Regular maintenance and testing of utility systems are essential to ensure their reliability and to prepare the organisation to restore operations in the event of a failure quickly.

 

7.12 Cabling Security


Purpose

Cabling security is critical for protecting the physical infrastructure that carries power and data throughout the organisation. This control ensures that cables are protected from interception, interference, or damage, which could lead to disruptions in operations or security breaches.


Implementation

Organisations should ensure that all cabling, including power, data, and network cables, is securely installed and protected from tampering or damage to implement this control. This may involve using conduits, cable trays, or protective casings to shield cables from physical harm or interference.


Cables should be routed through secure areas where possible, and access to these areas should be restricted to authorised personnel only.


The organisation should also regularly inspect and test cabling to ensure it remains in good condition and free from damage.


In addition to physical protection, organisations should consider using encryption or other security measures to protect the data transmitted over these cables.

 

7.13 Equipment Maintenance


Purpose

Regular equipment maintenance ensures the continued availability, integrity, and confidentiality of the information it processes. This control focuses on implementing maintenance procedures that keep equipment in optimal working condition and prevent security vulnerabilities that could arise from neglected or improperly maintained systems.


Implementation

Organisations should develop a maintenance schedule that includes regular inspections, updates, and repairs for all critical equipment to implement this control. This schedule should be based on the manufacturer’s recommendations and the organisation’s operational requirements.


Maintenance tasks should be performed by qualified personnel who are trained to recognise and address potential security issues.


All maintenance activities should be documented, and records should be kept of the work performed and any parts replaced.


The organisation should also implement procedures for securely handling and storing equipment during maintenance to prevent unauthorised access or tampering.


Regular reviews of the maintenance schedule and procedures should be conducted to ensure they remain effective and up-to-date.

 

7.14 Secure DispoReuse Re-use of Equipment


Purpose

Secure disposal or re-use of equipment must ensure that sensitive data and licensed software are not inadvertently exposed when equipment is retired or repurposed. This control addresses the need to verify that all data has been securely removed or overwritten before equipment is disposed of, preventing breaches or unauthorised access.


Implementation

Organisations should establish procedures for securely wiping or destroying data on storage media before equipment is disposed of or reused to implement this control. This may involve using specialised software to overwrite data multiple times, physically destroying the media, or degaussing.


Equipment reused within the organisation should be cleaned of all previous data and configurations to ensure no residual information remains.


The organisation should also implement tracking mechanisms to document the disposal or re-use of equipment, ensuring that all processes are completed and verified.


Employees responsible for equipment disporeuse re-use should be trained on the importance of these procedures and how to carry them out correctly.


Regular audits should be conducted to ensure compliance with the secure disposal or re-use policies.

 

Comments


Never miss another article.

About the author

Alan Parker is an IT consultant and project manager who specialises in IT governance, process implementation, and project delivery. With over 30 years of experience in the industry, Alan believes that simplifying complex challenges and avoiding pitfalls are key to successful IT management. He has led various IT teams and projects across multiple organisations, continually honing his expertise in ITIL and PRINCE2 methodologies. Alan holds a degree in Information Systems and has been recognised for his ability to deliver reliable and effective IT solutions. He lives in Berkshire, UK, with his family.

bottom of page