Skip to content

ISO 27001:2022 Control 7.9 – Security of Assets Outside the Office

When devices that hold valuable information assets are removed from the organisation’s physical location, they are more susceptible to harm, theft, loss, destruction, or breaches.

Physical security controls within an organisation’s facilities will not be effective, leaving its off-site assets exposed to threats like physical risks and malicious individuals trying to gain unauthorised access.

Employees working remotely may take corporate computers with confidential data away from the business, working in a cafe, hotel lobby, etc, connecting to unsecured public Wi-Fi and leaving their devices unmonitored. These actions present a risk to the security, confidentiality, integrity and availability of the info held on the devices.

Organisations should make sure devices taken outside the premises remain secure.

ISO 27001:2022 Annex A 7.9 outlines how organisations can ensure the security of devices located away from the main site, which host information assets. They must set up suitable controls and procedures to achieve this.

Purpose of ISO 27001:2022 Annex A 7.9

ISO 27001:2022 Annex A 7.9 allows organisations to safeguard the security of information assets housed in hardware by thwarting two distinct risks:

  • Minimising the chance of data assets in off-site devices being lost, harmed, destroyed, or exposed.
  • Avoiding interruption to the company’s data processing operations from the breach of external devices.



ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




Ownership of Annex A 7.9

ISO 27001:2022 Annex A 7.9 necessitates organisations to set up and implement protocols and regulations that cover all devices owned or used on behalf of the company. Additionally, it is vital to the effective protection of off-site devices that an asset inventory is created and upper management approves the use of personal devices.

The Information Security Manager should confer with management and asset owners and be responsible for developing, carrying out and sustaining procedures and measures to ensure the security of devices taken away from corporate premises.

General Guidance on ISO 27001:2022 Annex A 7.9 Compliance

Annex A 7.9 details six necessities that organisations must observe when constructing and applying measures and protocols for the safeguard of assets removed from the premises:

  1. Computers, USBs, hard drives, and monitors taken off-site by the company should never be left unattended in public areas like cafes, nor in any unsecure location.
  2. Comply with the device manufacturer’s instructions and specifications regarding physical protection of the device at all times. For example, adhere to their instructions on shielding the device from water, heat, electromagnetic fields, and dust.
  3. Employees and other organisations taking computing equipment outside corporate premises should maintain a log detailing the chain of custody. This log should include, at a minimum, the names of persons responsible for the device, and their organisation.
  4. If an organisation finds that authorisation is necessary and practical for the removal of equipment from corporate premises, they should establish a procedure. This procedure should cover the taking of certain equipment off-site and keep a record of all removal actions to provide the organisation with an audit trail.
  5. It is essential to take necessary steps to avert the danger of unapproved viewing of data on public transport screens.
  6. The organisation should install location-tracking tools and enable remote access, so the device’s location can be monitored and, if necessary, any data stored on the device can be remotely wiped.



climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




Supplementary Guidance on Annex A 7.9

ISO 27001:2022 Annex A 7.9 sets out requirements for protecting equipment that is installed outside of a company’s premises on a permanent basis.

This equipment could comprise of antennas and ATMs.

Considering the heightened risk of damage and loss of this equipment, Annex A 7.9 necessitates organisations consider the following when safeguarding it off-site:

  • ISO 27001:2022 Annex A 7.4, Physical Security Monitoring, should be taken into account.
  • Ensure ISO 27001:2022 Annex A 7.5 is taken into account, which is the protection against environmental and physical threats.
  • Access controls should be created and suitable steps should be taken to stop interference.
  • Create and apply logical access controls.

Annex A 7.9 advises organisations to bear in mind Annex A 6.7 and Annex A 8.1 when formulating and putting in place measures to safeguard devices and equipment.

Changes and Differences from ISO 27001:2013

ISO 27001:2022 Annex A 7.9 replaces ISO 27001:2013 Annex A 11.2.6.

There are three major distinctions that should be noted:

ISO 27001:2022 Annex A Control 7.9 requires an extensive set of instructions.

Annex A 7.9 introduces two new requirements in comparison to its ISO 27001:2013 version:

  • Appropriate steps should be taken to prevent unauthorised people from seeing the information on display in public transport.
  • Location monitoring and remote access should be enabled to enable tracking of the device and the capability to erase information stored on the device remotely, if necessary.

Annex A 7.9 introduces fresh criteria for devices which are permanently located away from the premises.

In comparison to the ISO 27001:2013 version, ISO 27001:2022 Annex A 7.9 provides distinct advice on safeguarding equipment that is fixed in an off-site location.

These could involve antennas and ATMs.

The prohibition of remote work is put in place to reduce risks.

The ISO 27001:2013 version made clear that organisations could ban employees from remote working if it was consistent with the risk levels that had been identified. By contrast, the ISO 27001:2022 version does not mention this.

Table of All ISO 27001:2022 Annex A Controls

In the table below you’ll find more information on each individual ISO 27001:2022 Annex A Control.

ISO 27001:2022 Organisational Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Organisational Controls Annex A 5.1 Annex A 5.1.1
Annex A 5.1.2
Policies for Information Security
Organisational Controls Annex A 5.2 Annex A 6.1.1 Information Security Roles and Responsibilities
Organisational Controls Annex A 5.3 Annex A 6.1.2 Segregation of Duties
Organisational Controls Annex A 5.4 Annex A 7.2.1 Management Responsibilities
Organisational Controls Annex A 5.5 Annex A 6.1.3 Contact With Authorities
Organisational Controls Annex A 5.6 Annex A 6.1.4 Contact With Special Interest Groups
Organisational Controls Annex A 5.7 NEW Threat Intelligence
Organisational Controls Annex A 5.8 Annex A 6.1.5
Annex A 14.1.1
Information Security in Project Management
Organisational Controls Annex A 5.9 Annex A 8.1.1
Annex A 8.1.2
Inventory of Information and Other Associated Assets
Organisational Controls Annex A 5.10 Annex A 8.1.3
Annex A 8.2.3
Acceptable Use of Information and Other Associated Assets
Organisational Controls Annex A 5.11 Annex A 8.1.4 Return of Assets
Organisational Controls Annex A 5.12 Annex A 8.2.1 Classification of Information
Organisational Controls Annex A 5.13 Annex A 8.2.2 Labelling of Information
Organisational Controls Annex A 5.14 Annex A 13.2.1
Annex A 13.2.2
Annex A 13.2.3
Information Transfer
Organisational Controls Annex A 5.15 Annex A 9.1.1
Annex A 9.1.2
Access Control
Organisational Controls Annex A 5.16 Annex A 9.2.1 Identity Management
Organisational Controls Annex A 5.17 Annex A 9.2.4
Annex A 9.3.1
Annex A 9.4.3
Authentication Information
Organisational Controls Annex A 5.18 Annex A 9.2.2
Annex A 9.2.5
Annex A 9.2.6
Access Rights
Organisational Controls Annex A 5.19 Annex A 15.1.1 Information Security in Supplier Relationships
Organisational Controls Annex A 5.20 Annex A 15.1.2 Addressing Information Security Within Supplier Agreements
Organisational Controls Annex A 5.21 Annex A 15.1.3 Managing Information Security in the ICT Supply Chain
Organisational Controls Annex A 5.22 Annex A 15.2.1
Annex A 15.2.2
Monitoring, Review and Change Management of Supplier Services
Organisational Controls Annex A 5.23 NEW Information Security for Use of Cloud Services
Organisational Controls Annex A 5.24 Annex A 16.1.1 Information Security Incident Management Planning and Preparation
Organisational Controls Annex A 5.25 Annex A 16.1.4 Assessment and Decision on Information Security Events
Organisational Controls Annex A 5.26 Annex A 16.1.5 Response to Information Security Incidents
Organisational Controls Annex A 5.27 Annex A 16.1.6 Learning From Information Security Incidents
Organisational Controls Annex A 5.28 Annex A 16.1.7 Collection of Evidence
Organisational Controls Annex A 5.29 Annex A 17.1.1
Annex A 17.1.2
Annex A 17.1.3
Information Security During Disruption
Organisational Controls Annex A 5.30 NEW ICT Readiness for Business Continuity
Organisational Controls Annex A 5.31 Annex A 18.1.1
Annex A 18.1.5
Legal, Statutory, Regulatory and Contractual Requirements
Organisational Controls Annex A 5.32 Annex A 18.1.2 Intellectual Property Rights
Organisational Controls Annex A 5.33 Annex A 18.1.3 Protection of Records
Organisational Controls Annex A 5.34 Annex A 18.1.4 Privacy and Protection of PII
Organisational Controls Annex A 5.35 Annex A 18.2.1 Independent Review of Information Security
Organisational Controls Annex A 5.36 Annex A 18.2.2
Annex A 18.2.3
Compliance With Policies, Rules and Standards for Information Security
Organisational Controls Annex A 5.37 Annex A 12.1.1 Documented Operating Procedures
ISO 27001:2022 People Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
People Controls Annex A 6.1 Annex A 7.1.1 Screening
People Controls Annex A 6.2 Annex A 7.1.2 Terms and Conditions of Employment
People Controls Annex A 6.3 Annex A 7.2.2 Information Security Awareness, Education and Training
People Controls Annex A 6.4 Annex A 7.2.3 Disciplinary Process
People Controls Annex A 6.5 Annex A 7.3.1 Responsibilities After Termination or Change of Employment
People Controls Annex A 6.6 Annex A 13.2.4 Confidentiality or Non-Disclosure Agreements
People Controls Annex A 6.7 Annex A 6.2.2 Remote Working
People Controls Annex A 6.8 Annex A 16.1.2
Annex A 16.1.3
Information Security Event Reporting
ISO 27001:2022 Physical Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Physical Controls Annex A 7.1 Annex A 11.1.1 Physical Security Perimeters
Physical Controls Annex A 7.2 Annex A 11.1.2
Annex A 11.1.6
Physical Entry
Physical Controls Annex A 7.3 Annex A 11.1.3 Securing Offices, Rooms and Facilities
Physical Controls Annex A 7.4 NEW Physical Security Monitoring
Physical Controls Annex A 7.5 Annex A 11.1.4 Protecting Against Physical and Environmental Threats
Physical Controls Annex A 7.6 Annex A 11.1.5 Working In Secure Areas
Physical Controls Annex A 7.7 Annex A 11.2.9 Clear Desk and Clear Screen
Physical Controls Annex A 7.8 Annex A 11.2.1 Equipment Siting and Protection
Physical Controls Annex A 7.9 Annex A 11.2.6 Security of Assets Off-Premises
Physical Controls Annex A 7.10 Annex A 8.3.1
Annex A 8.3.2
Annex A 8.3.3
Annex A 11.2.5
Storage Media
Physical Controls Annex A 7.11 Annex A 11.2.2 Supporting Utilities
Physical Controls Annex A 7.12 Annex A 11.2.3 Cabling Security
Physical Controls Annex A 7.13 Annex A 11.2.4 Equipment Maintenance
Physical Controls Annex A 7.14 Annex A 11.2.7 Secure Disposal or Re-Use of Equipment
ISO 27001:2022 Technological Controls
Annex A Control Type ISO/IEC 27001:2022 Annex A Identifier ISO/IEC 27001:2013 Annex A Identifier Annex A Name
Technological Controls Annex A 8.1 Annex A 6.2.1
Annex A 11.2.8
User Endpoint Devices
Technological Controls Annex A 8.2 Annex A 9.2.3 Privileged Access Rights
Technological Controls Annex A 8.3 Annex A 9.4.1 Information Access Restriction
Technological Controls Annex A 8.4 Annex A 9.4.5 Access to Source Code
Technological Controls Annex A 8.5 Annex A 9.4.2 Secure Authentication
Technological Controls Annex A 8.6 Annex A 12.1.3 Capacity Management
Technological Controls Annex A 8.7 Annex A 12.2.1 Protection Against Malware
Technological Controls Annex A 8.8 Annex A 12.6.1
Annex A 18.2.3
Management of Technical Vulnerabilities
Technological Controls Annex A 8.9 NEW Configuration Management
Technological Controls Annex A 8.10 NEW Information Deletion
Technological Controls Annex A 8.11 NEW Data Masking
Technological Controls Annex A 8.12 NEW Data Leakage Prevention
Technological Controls Annex A 8.13 Annex A 12.3.1 Information Backup
Technological Controls Annex A 8.14 Annex A 17.2.1 Redundancy of Information Processing Facilities
Technological Controls Annex A 8.15 Annex A 12.4.1
Annex A 12.4.2
Annex A 12.4.3
Logging
Technological Controls Annex A 8.16 NEW Monitoring Activities
Technological Controls Annex A 8.17 Annex A 12.4.4 Clock Synchronization
Technological Controls Annex A 8.18 Annex A 9.4.4 Use of Privileged Utility ProgramsAccess Rights
Technological Controls Annex A 8.19 Annex A 12.5.1
Annex A 12.6.2
Installation of Software on Operational Systems
Technological Controls Annex A 8.20 Annex A 13.1.1 Networks Security
Technological Controls Annex A 8.21 Annex A 13.1.2 Security of Network Services
Technological Controls Annex A 8.22 Annex A 13.1.3 Segregation of Networks
Technological Controls Annex A 8.23 NEW Web filtering
Technological Controls Annex A 8.24 Annex A 10.1.1
Annex A 10.1.2
Use of Cryptography
Technological Controls Annex A 8.25 Annex A 14.2.1 Secure Development Life Cycle
Technological Controls Annex A 8.26 Annex A 14.1.2
Annex A 14.1.3
Application Security Requirements
Technological Controls Annex A 8.27 Annex A 14.2.5 Secure System Architecture and Engineering PrinciplesLearning From Information Security Incidents
Technological Controls Annex A 8.28 NEW Secure Coding
Technological Controls Annex A 8.29 Annex A 14.2.8
Annex A 14.2.9
Security Testing in Development and Acceptance
Technological Controls Annex A 8.30 Annex A 14.2.7 Outsourced Development
Technological Controls Annex A 8.31 Annex A 12.1.4
Annex A 14.2.6
Separation of Development, Test and Production Environments
Technological Controls Annex A 8.32 Annex A 12.1.2
Annex A 14.2.2
Annex A 14.2.3
Annex A 14.2.4
Change Management
Technological Controls Annex A 8.33 Annex A 14.3.1 Test Information
Technological Controls Annex A 8.34 Annex A 12.7.1 Protection of Information Systems During Audit Testing

How ISMS.online Help

ISMS.online is the perfect tool for managing an ISO 27001:2022 implementation. It is tailored to help businesses implement an information security management system (ISMS) that meets the standards of ISO 27001:2022.

The platform employs a risk-based approach, alongside top-of-the-line best practices and templates, to aid in recognising the risks confronting your organisation and the necessary controls to manage them. By doing so, you can effectively minimise both your risk exposure and compliance costs.

Contact us now to arrange a demonstration.


Mike Jennings

Mike is the Integrated Management System (IMS) Manager here at ISMS.online. In addition to his day-to-day responsibilities of ensuring that the IMS security incident management, threat intelligence, corrective actions, risk assessments and audits are managed effectively and kept up to date, Mike is a certified lead auditor for ISO 27001 and continues to enhance his other skills in information security and privacy management standards and frameworks including Cyber Essentials, ISO 27001 and many more.

ISO 27001:2022 Annex A Controls

Organisational Controls