ISO 27001 Physical Security Policy
In this guide, you will learn what an ISO 27001 Physical Security Policy is, how to write it yourself and I give you a template you can download and use right away.
Table of contents
What is an ISO 27001 Physical Security Policy?
The ISO 27001 Physical Security Policy sets out how you manage the physical security of your premises, buildings and offices to protect the confidentiality, integrity and availability of data.
It is one of theย ISO 27001 policiesย required by theย ISO 27001ย standard forย ISO 27001 certification.

How to write an ISO 27001 Physical Security Policy
Time needed: 1 hour and 30 minutes
How to write an ISO 27001 Physical Security Policy
- Create your version control and document mark-up
ISO 27001 documents require version control of the author, the change, the date and the version as well as document mark up such as document classification.
- Write the ISO 27001 Physical Security Policy contents page
Document Contents Page
Physical and Environmental Security Policy
Purpose
Scope
Principle
Physical Security Perimeter
Secure Areas
Employee Access
Visitor Access
Delivery and Loading Areas
Network Access Control
Cabling Security
Equipment Siting and Protection - Write the ISO 27001 Physical Security Policy purpose
The purpose of the policy is to prevent unauthorised physical access, damage and interference to the organisationโs information and information processing facilities.
- Write the ISO 27001 Physical Security Policy principle
Physical and environmental security policy is built on the principle of exceeding Health and Safety regulation whilst protecting the most sensitive physical assets based on risk.
- Write the ISO 27001 Physical Security Policy scope
All company owned or leased premises or locations deemed in scope by the ISO 27001 scope statement. Our of scope is third party and supplier physical and environmental security.
All employees and third-party users. - Describe physical security perimeter controls
The physical perimeter of the building or site containing information processing facilities is physically sound. The exterior roof, walls and flooring of the site are of solid construction and all external doors are suitably protected against unauthorised access with control mechanisms (list them โ for example: bars, alarms, locks, enter-cards).
Doors and windows are locked when unattended and external protection in the form of bars is in place for windows, particularly at ground level.
Access to sites and buildings is restricted to authorised personnel.
A crewed reception area grants access to the building and maintains a record of access.
All fire doors on a security perimeter are alarmed, monitored, and tested in conjunction with the walls to establish the required level of resistance in accordance with suitable regional, national, and international standards. They should operate in accordance with the local fire code in a failsafe manner.
Suitable intruder detection systems are installed to national, regional, or international standards.
Information processing facilities managed by the organization are physically separated from those managed by external parties. - Document secure areas controls
Access rights to secure areas are regularly reviewed and updated and revoked when necessary.
Access to secure areas defaults to deny.
Access to areas where confidential information is processed or stored is restricted to authorized individuals only by implementing appropriate access controls, (list them – example: by implementing a two-factor authentication mechanism such as an access card and secret PIN).
Logs of access are held and maintained for a minimum of 3 months.
External third-party support service personnel are granted restricted access to secure areas or confidential information processing facilities only when required and always accompanied; this access is authorized and monitored.
Photographic, video, audio, or other recording equipment, such as cameras in mobile devices is not permitted in secure areas unless authorised. - Explain employee access
Employee access is based on least privilege providing access based on role.
Access control tokens, badges, are allocated to identify the employee or personnel and must be always worn.
Access control tokens, badges, are not shared, transferred, or loaned.
Access is revoked immediately upon termination and all physical access tokens are disabled and must be returned. - Explain visitor access
Visitors are allowed unfettered access to the public areas.
Visitors are issued with instructions on the security requirements of the area and on emergency procedures.
Visitors are recorded in the visitor logbook and the information maintained for a minimum of 3 months.
Visitors are allocated a visitor pass that clearly identifies the visitor status, denies access to secure areas, and expires at the end of the business day on which issued.
Visitor access to secure areas requires verification of identity and presenting photographic identification.
Visitors are always escorted, except in the use of public areas and bathrooms. - Describe delivery and loading area controls
Access to a delivery and loading area from outside of the building should be restricted to identified and authorized personnel.
The delivery and loading area should be designed so that supplies can be loaded and unloaded without delivery personnel gaining access to other parts of the building.
The external doors of a delivery and loading area should be secured when the internal doors are opened,
Incoming material should be inspected and examined for explosives, chemicals, or other hazardous materials, before it is moved from a delivery and loading area.
Incoming material should be registered in accordance with asset management procedures on entry to the site.
Incoming and outgoing shipments should be physically segregated, where possible.
Incoming material should be inspected for evidence of tampering on route. If such tampering is discovered, it should be immediately reported to security personnel. - Document network access control
Physical access to networking equipment is restricted which includes wireless access points, gateways, handheld devices, networking/communications hardware, and telecommunication lines.
Network jacks / points in public areas do not allow access to the company internal network.
Network jacks / points that allow access to the company internal network are secured by physical access control for entry and exit.
Visitors are prohibited from connecting devices to network jacks / points that allow access to the company internal network unless explicitly authorised to do so and are always escorted in areas with active network jacks / points. - Explain cabling security
Power and telecommunications cabling carrying data or supporting information services should be protected from interception, interference, or damage.
Power and telecommunication lines into processing facilities are underground.
Power cables are segregated from communication cables to prevent interference.
Physical access to network cables is restricted where possible.
Access to cable rooms and patch panels is restricted by physical access control. - Explain equipment siting and protection
Equipment should be sited to minimise unnecessary access into work areas.
Information processing facilities handling sensitive data should be positioned carefully to reduce the risk of information being viewed by unauthorised persons during their use.
Storage facilities should be secured to avoid unauthorised access.
Items requiring special protection should be safeguarded to reduce the general level of protection required.
Controls should be adopted to minimsze the risk of potential physical and environmental threats, e.g., theft, fire, explosives, smoke, water (or water supply failure), dust, vibration, chemical effects, electrical supply interference, communications interference, electromagnetic radiation, and vandalism.
Guidelines for eating, drinking, and smoking in proximity to information processing facilities should be established.
Environmental conditions, such as temperature and humidity, should be monitored for conditions which could adversely affect the operation of information processing facilities.
Lightning protection should be applied to all buildings and lightning protection filters should be fitted to all incoming power and communications lines.
The use of special protection methods, such as keyboard membranes, should be considered for equipment in industrial environments.
Equipment processing confidential information should be protected to minimize the risk of information leakage due to electromagnetic emanation.
ISO 27001 Physical Security Policy Template
The ISO 27001 Physical Security Policy Template is designed to fast track your implementation and give you an exclusive, industry best practice policy template that is pre written and ready to go. It is included in the ISO 27001 toolkit.
ISO 27001 Physical Security Policy Example
An example ISO 27001 Physical Security Policy:
Further Reading
ISO 27001 Annex A 7.1 Physical security perimeter
ISO 27001 Annex A 7.2 Physical entry controls
ISO 27001 Annex A 7.3 Securing offices, rooms and facilities
ISO 27001 Annex A 7.4 Physical security monitoring
ISO 27001 Annex A 7.5 Protecting against physical and environmental threats
ISO 27001 Annex A 7.6 Working in secure areas