Table of contents
Working In Secure Areas ISO 27001
Secure areas are special areas in your organisation that require additional security controls. This is usually due to the confidentiality of the data or worked performed in that area.
In this ultimate guide to ISO 27001 Working In Secure Areas you will learn
- What are ISO 27001 Secure Areas
- How to implement security controls in secure areas for ISO 27001
I am Stuart Barker, the ISO 27001 Ninja and author of the Ultimate ISO 27001 Toolkit.
With over 30 years industry experience I will show you what’s new, give you ISO 27001 templates, show you examples, do a walkthrough and show you how to implement it for ISO 27001 certification.
What is ISO 27001 Working In Secure Areas?
ISO 27001:2022 Annex A 7.6 Working In Secure Areas is an ISO 27001 control that requires an organisation to put measures in place for security when working in secure areas.
This is about stopping people who work in these secure areas from causing damage and unauthorised interference.
ISO 27001 Working In Secure Areas Purpose
ISO 27001:2022 Annex A 7.6 is a preventive control that ensures you protect information and other associated assets in secure areas from damage and unauthorised interference by personnel working in these areas.
ISO 27001 Working In Secure Areas Definition
The ISO 27001 standard defines Working In Secure Areas as:
Security measures for working in secure areas should be designed and implemented.
ISO27001:2022 Annex A 7.6 Working In Secure Areas
![ISO 27001 Toolkit](https://hightable.io/wp-content/uploads/2023/05/4470-Web-Banner-P1-01-1024x499.jpg)
Implementation Guide
General Considerations
You are going to have to
- Implement a need to know approach to the existence, operation and working processes of secure areas
- Where practicable ensure that work in secure areas is supervised
- Put in a process of locking and inspecting vacant secure areas
- Consider preventing the use of cameras, phones, recording equipment unless you authorise it
- Train people in emergency procedures
- Communicate emergency procedures
- Follow all health and safety laws as well as all laws and regulations
The implementation of working in secure areas is in the context of the physical security perimeter where you can find guidance in the Ultimate guide to ISO 27001 Annex A 7.1 Physical Security Perimeter.
Health and Safety
Your number one priority is to meet the requirements of law and regulation. Be sure to engage with a legal professional to understand what you can and cannot do and to check that you are not breaking any laws. The most significant laws are those around health and safety as the protection of human life and wellbeing is always our number priority. There are common things that should be considered such as entry point doors that fail open. Whilst we want to protect buildings and information our absolute priority is to protect people.
Topic specific physical and environmental security policy
To communicate to people what you do and what is expected you are going to write, sign off, implement and communicate your topic specific Physical and Environmental Security Policy.
![ISO 27001 Physical and Environmental Security Policy Template](https://hightable.io/wp-content/uploads/2021/04/ISO27001-Physical-and-Environmental-Security-Policy-Black-1024x1024.png)
Watch the Tutorial
Watch the ISO 27001 working in secure areas tutorial.
ISO 27001 Templates
For Annex A 7.6 you need a topic specific Physical and Environmental Security Policy Template.
Having ISO 27001 templates can help fast track your ISO 27001 implementation. The ISO 27001 Toolkit is the ultimate resource for your ISO 27001 certification.
How to pass the audit
To pass the audit of ISO 27001 Annex A 7.6 you are going to
- Define your physical protection requirements
- Consult with a legal professional to ensure you are meeting legal and regulatory requirements
- Consult with appropriate professionals who specialise in the identified protection requirements
- Implement your physical threat protection
- Write, sign off, implement and communicate your topic specific Physical and Environmental Security Policy
- Write, sign off, implement and communicate your secure working procedures
- Implement a process of internal audit that checks that the appropriate controls are in place and effective and where they are not follow the continual improvement process to address the risks
What the auditor will check
The audit is going to check a number of areas. Lets go through them
1. That you have defined secure working areas
Not every business or organisation requires secure areas but if you do the audit will check that you have defined what they are, done a risk assessment and put in place the appropriate controls and processes.
2. The you have implemented controls
They have been doing this a long time and done many audits so they know what to look for. They will test the controls and see what happens where they can. They will want to see evidence that the controls have been reviewed and tested and are working as intended.
3. Documentation
They are going to look at audit trails and all your documentation. They will look at appropriate maintenance, reviews, logs of monitors and reports, incidents and how you managed them.
Top 3 Mistakes People Make
The top 3 mistakes people make for ISO 27001 Annex A 7.6 are
1. Your fire extinguishers are not up to date
This one feels a bit random but as they walk around they will check fire extinguishers and look for evidence that they are operational and maintained. An example would be a fire extinguisher that works on pressure and the pressure gauge is at zero or in the red. Also that there is no evidence of them being maintained.
2. One or more members of your team haven’t done what they should have done
Prior to the audit check that all members of the team have done what they should have. Have control reviews taken place? Who gets informed about about the alarms and notification and do they still work here? Have you done periodic checks of vacant secure areas.
3. Your document and version control is wrong
Keeping your document version control up to date, making sure that version numbers match where used, having a review evidenced in the last 12 months, having documents that have no comments in are all good practices.
ISO 27001 Working In Secure Areas FAQ
Secure areas are usually where the most confidential work takes place, the most confidential data is processed and the most valuable assets are kept. They operate like a safe in a building. The ultimate line of physical defence. Getting this wrong can pose a significant risk to the organisation and its operation with the most likely result a data breach or loss of high value asset. The worst case scenario is that if this does occur that you do not know about it.
You will need the ISO 27001 Physical and Environmental Security Policy
There are templates that support ISO 27001 Annex A 7.6 located in the ISO 27001 toolkit
If you have a physical location, office or processing facility, then yes.
Yes. You can write the policies for IS27001 Annex A 7.6 yourself. You will need a copy of the standard and approximately 8 hours to do it. It would be advantageous to have a background n information security management systems. Alternatively you can download them the ISO 27001 Physical and Environmental Security Policy
The main template you need is the Physical and Environmental Security Policy
IS27001 Annex A 7.6 is not particularly hard as it is mainly common sense. As long as you consult with a legal professional on what you are doing to ensure you are not break any laws or regulations you will be fine. Physical security has been around a long time.
To write the Physical and Environmental Security Policy will take about 8 hours. To implement the controls will depend on what you re doing and what you are implementing. It can take from a few hours to a few months depending on how many locations you have and the level of security that you are implementing.
The Physical and Environmental Security Policy will cost you 8 hours to write yourself or less than £10 to buy. The cost to implement the controls will depend on what controls you implement and where you buy them.
Matrix of ISO 27001 controls and attribute values
Control type | Information security properties | Cybersecurity concepts | Operational capabilities | Security domains |
---|---|---|---|---|
Preventive | Confidentiality | Protect | Physical security | Protection |
Integrity | ||||
Availability |