Table of contents
ISO 27001 Physical Entry
ISO 27001 Physical Entry in ISO 27001 is about having controlled entry points and access points to prevent unauthorised accesses.
In this ultimate guide to ISO 27001 Physical Entry you will learn
- What is ISO 27001 Physical Entry
- How to implement entry controls and access controls for ISO 27001
I am Stuart Barker, the ISO 27001 Ninja and author of the Ultimate ISO 27001 Toolkit.
With over 30 years industry experience I will show you what’s new, give you ISO 27001 templates, show you examples, do a walkthrough and show you how to implement it for ISO 27001 certification.
What is ISO 27001 Annex A 7.2?
ISO 27001:2022 Annex A 7.2 Physical Entry is an ISO 27001 Annex A control that requires an organisation to protect secure areas with access points and entry controls.
ISO 27001 Annex A 7.2 Purpose
ISO 27001:2022 Annex A 7.2 is a preventive control to ensure only authorised physical access to the organisations information and other associated assets occurs.
ISO 27001 Annex A 7.2 Definition
The ISO 27001 standard defines Annex A 7.2 as:
Secure areas should be protected by appropriate entry controls and access points.
ISO 27001:2022 Annex A 7.2 Physical Entry
Implementation Guide
General Guidance
You are going to have to
- consult a legal professional to ensure you operate within the law and regulation
- only allow people you authorise into buildings, sites and physical locations
- implement a process to manage access
- review access on a regular basis
- keep a log of access
ISO 27001 Physical Entry Checklist
There are considerations that may be appropriate
- consider a reception area that is monitored
- consider, if appropriate, searching people
- take into account shared access with other organisations
- have identification for staff and visitors
- secure entry points such emergency access in a way that is legal and safe
- the possibility of different technologies such as bio metrics
- having a process for the management of physical keys
The implementation of physical entry is in the context of the physical security perimeter where you can find guidance in the Ultimate guide to ISO 27001 Annex A 7.1 Physical Security Perimeter.
Health and Safety
Your number one priority is to meet the requirements of law and regulation. Be sure to engage with a legal professional to understand what you can and cannot do and to check that you are not breaking any laws. The most significant laws are those around health and safety as the protection of human life and wellbeing is always our number priority. There are common things that should be considered such as entry point doors that fail open. Whilst we want to protect buildings and information our absolute priority is to protect people.
Define your access control requirements
Start by understanding your risk and doing a risk assessment. For guidance on how, read The Complete Guide to ISO 27001 Risk Assessment. This is going to be based on the needs of the business and the risks that you are managing. As a starting point there are basics such as having locks on doors but you can asses the strength of those locks and if other additional controls such as bio metrics or gates are required. Do what is right for you. Consider the environment around the location and the threats that may be posed and be sensible in addressing them.
Implement the access process
You will define, write, sign off and implement the access process based on risk and need. The process will take into account how you grant access, how you change access, how you revoke access and how you review access.
The review of access will be done regularly and you will set what is meant by regularly. A good rule of thumb would be monthly but there are many factors that influence how often you perform reviews. Those factors include:
- how fast the personnel changes
- the sensitivity of the site being accessed
- the risk to business
- the needs of business
- past information security events
Your access process will include keeping, and keeping securely, a log of visitors. Some people use a log book, or digital records. Take into account here data protection laws and the length of time that you keep the information.
Topic specific physical and environmental security policy
To communicate to people what you do and what is expected you are going to write, sign off, implement and communicate your topic specific Physical and Environmental Security Policy.
Reception Areas
The standard is not saying that you must have a reception but that it can be considered. Be sensible when assessing this. If is appropriate then you can implement. It is not a requirement to have personnel to be deployed on reception but having it monitored by personnel would make sense. This could be done remotely rather than having someone sat there full time.
Visitors
The guidelines to review and consider for visitors
- how to authenticate the identity of visitors
- recording when people go in and out
- supervising visitors or giving them explicit permission to roam alone
Visitor Badges
A great physical control is the use of identification for staff and visitors. A visitor badge or way that a visitor can be identified can quickly identify is someone is somewhere they should not be. Proportionate to your organisation.
Alarms and Monitors
When looking at alarms and monitors you are looking at a preventive control to alert you when something has occurred. We all know what alarms are and getting alarms fitted is a very good idea. You want to define your response process and make sure that contacts of who is informed is up to date. Who is getting that call at 2am in the morning and what are they going to do when they get it?
Physical Keys
If you have and need physical keys then you will need a process to manage them. Ensuring that they are allocated to the correct people and you account for if those people are not available or leave. This also applies to other required authentication tokens and passcodes such as combination locks. Some way to perform and annual audit and the use of a log book or similar.
CCTV
You can consider the use of CCTV but be aware that comes with some additional overheads with laws on data protection and the likes of GDPR. You should seek some legal advice before installing CCTV and be sure to do it in a way that is compliant if it is something that you do want to do. There are considerations such as how, how long, where, in what format you store the recordings. Then how do you get access to it, who can get access to it and how do you destroy it. It is not as simple as just banging up a Ring camera.
Secure Areas
The standard gives the guidance that a secure area can be an office that is locked or some internal area that has an internal security barrier. It takes into account that your physical locations maybe internal sub divided based on protection requirements. Usually this is implemented when you have a file room, an archive room, or a room where you store old IT equipment. On premises data centres and data rooms fall into this category as well but in this day and age they are few and far between with most people adopting a cloud based strategy.
Watch the tutorial
Watch the ISO 27001 tutorial on physical entry controls.
ISO 27001 Templates
For Annex A 7.2 you need a topic specific Physical and Environmental Security Policy Template.
Having ISO 27001 templates can help fast track your ISO 27001 implementation. The ISO 27001 Toolkit is the ultimate resource for your ISO 27001 certification.
How to pass the audit
To comply with ISO 27001 Annex A 7.2 you are going to:
- Define your physical access requirements
- Define your internal sub zone physical perimeter requirements
- Consult with a legal professional to ensure you are meeting legal and regulatory requirements
- Implement your physical security access
- Write, sign off, implement and communicate your topic specific Physical and Environmental Security Policy
- Write, sign off, implement and communicate your perimeter incident response procedures
- Implement a process of internal audit that checks that the appropriate controls are in place and effective and where they are not follow the continual improvement process to address the risks
What the auditor will check
The audit is going to check a number of areas. Lets go through them
1. That you have a physical entry control
One of the easier things for an auditor to check is the physical entry controls as it is usually the first thing they will encounter when they come to audit you if you have a physical location. For all the physical locations in scope they are going to visit and check.
2. The strength of the physical security access
They have been doing this a long time and done many audits so they know what to look for. They will test the controls and see what happens. They will try to open doors, open cupboards, gain access to areas they should not.
3. Documentation
They are going to look at audit trails and all your documentation. They will look at appropriate access reviews, logs of monitors and reports, incidents and how you managed them.
Top 3 Mistakes People Make
The top 3 mistakes people make for ISO 27001 Annex A 7.2 are
1. Your physical security perimeter is turned off
What do I mean by turned off? In simple terms it means that you have a lockable door that should be locked and it not locked. You have a fire door that should be closed and locked but you have propped it open because it is a hot day.
2. One or more members of your team haven’t done what they should have done
Prior to the audit check that all members of the team have done what they should have. Have access reviews taken place? Who gets informed about about the alarm and do they still work here?
3. Your document and version control is wrong
Keeping your document version control up to date, making sure that version numbers match where used, having a review evidenced in the last 12 months, having documents that have no comments in are all good practices.
ISO 27001 Annex A 7.2 FAQ
A physical security entry system is a first line of defence, common sense and dare I say a no brainer. Think of your own house. Would you leave the door open, or unlocked when you are out? Even when you are in, to be fair. It’s a cruel world out there and not everyone has your best intention at heart. If you have something of value, be it physical or virtual, someone, somewhere wants it. That value you place on it will dictate the level of control you put in place.
You will need the ISO 27001 Physical and Environmental Security Policy
There are templates that support ISO 27001 Annex A 7.2 located in the ISO 27001 Toolkit
If you have a physical location, office or processing facility, then yes.
Yes. You can write the policies for ISO 27001 Annex A 7.2 yourself. You will need a copy of the standard and approximately 8 hours to do it. It would be advantageous to have a background in information security management systems. Alternatively you can download them the ISO 27001 Physical and Environmental Security Policy
The main template you need is the Physical and Environmental Security Policy
ISO 27001 Annex A 7.2 is not particularly hard as it is mainly common sense. As long as you consult with a legal professional on what you are doing to ensure you are not break any laws or regulations you will be fine. Physical security has been around a long time.
To write the Physical and Environmental Security Policy will take about 8 hours. To implement the controls will depend on what you re doing and what you are implementing. It can take from a few hours to a few months depending on how many locations you have and the level of security that you are implementing.
The Physical and Environmental Security Policy will cost you 8 hours to write yourself or less than £10 to buy. The cost to implement the controls will depend on what controls you implement and where you buy them.
Matrix of ISO 27001 controls and attribute values
Control type | Information security properties | Cybersecurity concepts | Operational capabilities | Security domains |
Preventive | Confidentiality Integrity Availability | Protect | Physical security Identity and Access Management | Protection |