Skip to content

What is ISO 27001:2022 Annex A 7.1?

ISO 27001:2022 Annex A 7.1 requires organisations to establish security perimeters and use them to safeguard information and associated assets.

Information and Information Security Assets Explained

Information can be described as any data, knowledge, or insight that has worth to an organisation or company. This includes any details obtained about individuals, customers, partners, employees, and other stakeholders.

Information security assets can be broadly classified into:

Data

Data and information are often mistaken for one another but there is a distinct difference. Data is raw, unprocessed and generally of no use in its present form. On the other hand, information is data that has been arranged into a usable format, such as an email or phone number.

Infrastructure

Infrastructure encompasses all components of a network – servers, printers, routers, and more – to create a cohesive system.

Software infrastructure, such as operating systems and applications, must be safeguarded from cyber threats, just as hardware does. To avoid exploitation by malicious hackers seeking access to sensitive data, both need to be regularly updated with patches and fixes for any vulnerabilities exposed by hackers.

Physical Security Perimeters Explained

Physical security refers to the physical measures that safeguard an organisation’s resources and premises. It is a fundamental and indispensable part of information security. It involves more than just locking the door; it also entails being aware of who has access to what, when, where, and how.

Physical security perimeters identify the physical boundaries of a building or area and control access to it. Fences, walls, gates and other barriers can be employed to prevent unauthorised entry by people or vehicles. Furthermore, electronic surveillance equipment such as CCTV cameras can be used to monitor activity outside the facility.

Physical security perimeters offer the initial layer of protection against outsiders attempting to access your computer system via a wired or wireless connection in a business. They are frequently combined with additional information security controls, such as identity management, access control, and intrusion detection systems.




ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




Guidance on ISO 27001:2022 Annex A 7.1

ISO 27001:2022 Annex A 7.1 guarantees an organisation can show it has suitable physical security boundaries in place to stop unauthorised physical access to information and other related assets.

This entails taking steps to preclude:

  • Unauthorised entry into buildings, rooms, or areas containing information assets is prohibited.
  • The removal of assets without permission from the premises is unacceptable.
  • The unauthorised utilisation of premises assets, such as computers and related devices, is not permitted.
  • Unauthorised tampering with electronic communication equipment, such as telephones, faxes and computer terminals, is not allowed.

It is possible to implement physical security perimeters in two different ways:

Physical access control – safeguards entry to facilities and buildings and movement within them. This includes locking doors, alarms, fences and barriers.

Hardware security – provides control over physical equipment, such as computers, printers and scanners, that process data containing sensitive information.

This control helps safeguard information and other related assets, such as confidential documents, records, and equipment, by preventing unauthorised use of facility space, equipment, and supplies.

What’s Involved and How to Meet the Requirements

Guidelines to be taken into account for physical security perimeters should be adopted where feasible:

  • Establishing security barriers and pinpointing the exact location and strength of each in line with information security regulations concerning the resources within the boundary.
  • Ensuring the physical security of a building or site that houses information processing systems is vital, with no gaps or weak points in the perimeter where a break-in could be facilitated.
  • The exterior surfaces of the site, including roofs, walls, ceilings, and flooring, must be of sturdy construction and all external doors should be outfitted with control mechanisms like bars, alarms, and locks to prevent unauthorised entry.
  • Ensure windows and doors are locked when unoccupied and consider external security for windows, especially on the ground floor; ventilation must be taken into account too.

For further insight into what is expected for compliance with the ISO 27001:2022 standard, consult the associated documentation.




climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




Changes and Differences from ISO 27001:2013

ISO 27001:2022 Annex A 7.1 replaces ISO 27001:2013 Annex A 11.1.1; the context and meaning remaining largely similar, albeit phrased differently.

The 2022 version saw a reduction in implementation requirements compared to the prior control.

Annex A 7.1 lacks the requirements detailed in Annex A 11.1.1, which are as followed:

  • There should be a staffed reception area or another way of managing physical entry to the site or building.
  • Only authorised personnel should be permitted entry to sites and buildings.
  • Construct physical barriers, when applicable, to impede unauthorised physical access and avert environmental contamination.
  • Installing intruder detection systems that meet national, regional, or international standards and testing them regularly to secure all external doors and accessible windows is necessary.
  • All unoccupied areas should be fitted with an alarm system at all times.
  • We should ensure coverage of other areas, such as computer and communications rooms.
  • The organisation should keep their information processing facilities physically separated from those managed by external sources.

No omission reduces the effectiveness of the new ISO 27001:2022 standard; instead, they were eliminated to make the control easier to use and understand.

Table of All ISO 27001:2022 Annex A Controls

In the table below you’ll find more information on each individual ISO 27001:2022 Annex A Control.

ISO 27001:2022 Organisational Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Organisational Controls Annex A 5.1 Annex A 5.1.1
Annex A 5.1.2
Policies for Information Security
Organisational Controls Annex A 5.2 Annex A 6.1.1 Information Security Roles and Responsibilities
Organisational Controls Annex A 5.3 Annex A 6.1.2 Segregation of Duties
Organisational Controls Annex A 5.4 Annex A 7.2.1 Management Responsibilities
Organisational Controls Annex A 5.5 Annex A 6.1.3 Contact With Authorities
Organisational Controls Annex A 5.6 Annex A 6.1.4 Contact With Special Interest Groups
Organisational Controls Annex A 5.7 NEW Threat Intelligence
Organisational Controls Annex A 5.8 Annex A 6.1.5
Annex A 14.1.1
Information Security in Project Management
Organisational Controls Annex A 5.9 Annex A 8.1.1
Annex A 8.1.2
Inventory of Information and Other Associated Assets
Organisational Controls Annex A 5.10 Annex A 8.1.3
Annex A 8.2.3
Acceptable Use of Information and Other Associated Assets
Organisational Controls Annex A 5.11 Annex A 8.1.4 Return of Assets
Organisational Controls Annex A 5.12 Annex A 8.2.1 Classification of Information
Organisational Controls Annex A 5.13 Annex A 8.2.2 Labelling of Information
Organisational Controls Annex A 5.14 Annex A 13.2.1
Annex A 13.2.2
Annex A 13.2.3
Information Transfer
Organisational Controls Annex A 5.15 Annex A 9.1.1
Annex A 9.1.2
Access Control
Organisational Controls Annex A 5.16 Annex A 9.2.1 Identity Management
Organisational Controls Annex A 5.17 Annex A 9.2.4
Annex A 9.3.1
Annex A 9.4.3
Authentication Information
Organisational Controls Annex A 5.18 Annex A 9.2.2
Annex A 9.2.5
Annex A 9.2.6
Access Rights
Organisational Controls Annex A 5.19 Annex A 15.1.1 Information Security in Supplier Relationships
Organisational Controls Annex A 5.20 Annex A 15.1.2 Addressing Information Security Within Supplier Agreements
Organisational Controls Annex A 5.21 Annex A 15.1.3 Managing Information Security in the ICT Supply Chain
Organisational Controls Annex A 5.22 Annex A 15.2.1
Annex A 15.2.2
Monitoring, Review and Change Management of Supplier Services
Organisational Controls Annex A 5.23 NEW Information Security for Use of Cloud Services
Organisational Controls Annex A 5.24 Annex A 16.1.1 Information Security Incident Management Planning and Preparation
Organisational Controls Annex A 5.25 Annex A 16.1.4 Assessment and Decision on Information Security Events
Organisational Controls Annex A 5.26 Annex A 16.1.5 Response to Information Security Incidents
Organisational Controls Annex A 5.27 Annex A 16.1.6 Learning From Information Security Incidents
Organisational Controls Annex A 5.28 Annex A 16.1.7 Collection of Evidence
Organisational Controls Annex A 5.29 Annex A 17.1.1
Annex A 17.1.2
Annex A 17.1.3
Information Security During Disruption
Organisational Controls Annex A 5.30 NEW ICT Readiness for Business Continuity
Organisational Controls Annex A 5.31 Annex A 18.1.1
Annex A 18.1.5
Legal, Statutory, Regulatory and Contractual Requirements
Organisational Controls Annex A 5.32 Annex A 18.1.2 Intellectual Property Rights
Organisational Controls Annex A 5.33 Annex A 18.1.3 Protection of Records
Organisational Controls Annex A 5.34 Annex A 18.1.4 Privacy and Protection of PII
Organisational Controls Annex A 5.35 Annex A 18.2.1 Independent Review of Information Security
Organisational Controls Annex A 5.36 Annex A 18.2.2
Annex A 18.2.3
Compliance With Policies, Rules and Standards for Information Security
Organisational Controls Annex A 5.37 Annex A 12.1.1 Documented Operating Procedures
ISO 27001:2022 People Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
People Controls Annex A 6.1 Annex A 7.1.1 Screening
People Controls Annex A 6.2 Annex A 7.1.2 Terms and Conditions of Employment
People Controls Annex A 6.3 Annex A 7.2.2 Information Security Awareness, Education and Training
People Controls Annex A 6.4 Annex A 7.2.3 Disciplinary Process
People Controls Annex A 6.5 Annex A 7.3.1 Responsibilities After Termination or Change of Employment
People Controls Annex A 6.6 Annex A 13.2.4 Confidentiality or Non-Disclosure Agreements
People Controls Annex A 6.7 Annex A 6.2.2 Remote Working
People Controls Annex A 6.8 Annex A 16.1.2
Annex A 16.1.3
Information Security Event Reporting
ISO 27001:2022 Physical Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Physical Controls Annex A 7.1 Annex A 11.1.1 Physical Security Perimeters
Physical Controls Annex A 7.2 Annex A 11.1.2
Annex A 11.1.6
Physical Entry
Physical Controls Annex A 7.3 Annex A 11.1.3 Securing Offices, Rooms and Facilities
Physical Controls Annex A 7.4 NEW Physical Security Monitoring
Physical Controls Annex A 7.5 Annex A 11.1.4 Protecting Against Physical and Environmental Threats
Physical Controls Annex A 7.6 Annex A 11.1.5 Working In Secure Areas
Physical Controls Annex A 7.7 Annex A 11.2.9 Clear Desk and Clear Screen
Physical Controls Annex A 7.8 Annex A 11.2.1 Equipment Siting and Protection
Physical Controls Annex A 7.9 Annex A 11.2.6 Security of Assets Off-Premises
Physical Controls Annex A 7.10 Annex A 8.3.1
Annex A 8.3.2
Annex A 8.3.3
Annex A 11.2.5
Storage Media
Physical Controls Annex A 7.11 Annex A 11.2.2 Supporting Utilities
Physical Controls Annex A 7.12 Annex A 11.2.3 Cabling Security
Physical Controls Annex A 7.13 Annex A 11.2.4 Equipment Maintenance
Physical Controls Annex A 7.14 Annex A 11.2.7 Secure Disposal or Re-Use of Equipment
ISO 27001:2022 Technological Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Technological Controls Annex A 8.1 Annex A 6.2.1
Annex A 11.2.8
User Endpoint Devices
Technological Controls Annex A 8.2 Annex A 9.2.3 Privileged Access Rights
Technological Controls Annex A 8.3 Annex A 9.4.1 Information Access Restriction
Technological Controls Annex A 8.4 Annex A 9.4.5 Access to Source Code
Technological Controls Annex A 8.5 Annex A 9.4.2 Secure Authentication
Technological Controls Annex A 8.6 Annex A 12.1.3 Capacity Management
Technological Controls Annex A 8.7 Annex A 12.2.1 Protection Against Malware
Technological Controls Annex A 8.8 Annex A 12.6.1
Annex A 18.2.3
Management of Technical Vulnerabilities
Technological Controls Annex A 8.9 NEW Configuration Management
Technological Controls Annex A 8.10 NEW Information Deletion
Technological Controls Annex A 8.11 NEW Data Masking
Technological Controls Annex A 8.12 NEW Data Leakage Prevention
Technological Controls Annex A 8.13 Annex A 12.3.1 Information Backup
Technological Controls Annex A 8.14 Annex A 17.2.1 Redundancy of Information Processing Facilities
Technological Controls Annex A 8.15 Annex A 12.4.1
Annex A 12.4.2
Annex A 12.4.3
Logging
Technological Controls Annex A 8.16 NEW Monitoring Activities
Technological Controls Annex A 8.17 Annex A 12.4.4 Clock Synchronization
Technological Controls Annex A 8.18 Annex A 9.4.4 Use of Privileged Utility ProgramsAccess Rights
Technological Controls Annex A 8.19 Annex A 12.5.1
Annex A 12.6.2
Installation of Software on Operational Systems
Technological Controls Annex A 8.20 Annex A 13.1.1 Networks Security
Technological Controls Annex A 8.21 Annex A 13.1.2 Security of Network Services
Technological Controls Annex A 8.22 Annex A 13.1.3 Segregation of Networks
Technological Controls Annex A 8.23 NEW Web filtering
Technological Controls Annex A 8.24 Annex A 10.1.1
Annex A 10.1.2
Use of Cryptography
Technological Controls Annex A 8.25 Annex A 14.2.1 Secure Development Life Cycle
Technological Controls Annex A 8.26 Annex A 14.1.2
Annex A 14.1.3
Application Security Requirements
Technological Controls Annex A 8.27 Annex A 14.2.5 Secure System Architecture and Engineering PrinciplesLearning From Information Security Incidents
Technological Controls Annex A 8.28 NEW Secure Coding
Technological Controls Annex A 8.29 Annex A 14.2.8
Annex A 14.2.9
Security Testing in Development and Acceptance
Technological Controls Annex A 8.30 Annex A 14.2.7 Outsourced Development
Technological Controls Annex A 8.31 Annex A 12.1.4
Annex A 14.2.6
Separation of Development, Test and Production Environments
Technological Controls Annex A 8.32 Annex A 12.1.2
Annex A 14.2.2
Annex A 14.2.3
Annex A 14.2.4
Change Management
Technological Controls Annex A 8.33 Annex A 14.3.1 Test Information
Technological Controls Annex A 8.34 Annex A 12.7.1 Protection of Information Systems During Audit Testing

Who Is in Charge of This Process?

The Chief Information Officer (CIO) is the leader responsible for safeguarding company data and systems. They work with other executives to consider security when making business decisions, such as the Chief Financial Officer and Chief Executive Officer. Implementing policies and procedures to protect the company’s information is a key part of the CIO’s role.

The Chief Financial Officer has a role in deciding on physical security perimeters. Working with other C-suite executives, including the CIO, they decide how much to invest in physical security measures such as surveillance cameras, access controls and alarms.




[case_study_slider ids=”88859,101932,92016″ autoplay=”true” autoplay_speed=”5000″]


What Do These Changes Mean for You?

ISO 27001:2022 is not a major overhaul, so no significant alterations are necessary for compliance.

It is worth examining your current implementation to guarantee it is in line with the new requirements. Particularly, if any changes were made since the version of 2013. It is worth re-assessing those changes to determine if they remain valid or need to be altered.

How ISMS.Online Help

ISMS.online can assist in proving ISO 27001 compliance by providing an online system that enables storage of documents in a single, accessible location. It also facilitates development of checklists for each document, thus facilitating review and modification of documents.

Would you like to experience how it works?

Contact us today to reserve a demonstration.


Mike Jennings

Mike is the Integrated Management System (IMS) Manager here at ISMS.online. In addition to his day-to-day responsibilities of ensuring that the IMS security incident management, threat intelligence, corrective actions, risk assessments and audits are managed effectively and kept up to date, Mike is a certified lead auditor for ISO 27001 and continues to enhance his other skills in information security and privacy management standards and frameworks including Cyber Essentials, ISO 27001 and many more.

ISO 27001:2022 Annex A Controls

Organisational Controls