ISO-27001-Annex-A.11-Physica- and-Environmental-Security

ISO 27001 Annex : A.11 Physical and Environmental Security

ISO 27001 Annex : A.11 Physical and Environmental Security in this article explain Secure areas, Physical Security Perimeter and Physical Entry Controls. 

A.11.1 Secure areas

Its objective is to avoid unauthorized physical access, damage and interference with the organization’s information and information processing facilities.

A.11.1.1 Physical Security Perimeter

Control- Security perimeters should be established in order to secure areas that contain either sensitive or confidential information and information processing facilities.

Implementation Guidance- When appropriate, for physical security perimeters, the following guidelines should be considered and implemented:

  1. Security perimeters should be established and the location and intensity of each perimeter should depend on the security requirements of the assets inside the perimeter and on the results of the risk assessment;
  2. The building or facility perimeters should be physically secure (i.e. there are no perimeter gaps or places where a break-in can easily occur); the site’s exterior buildings, walls, and floors should be securely built and all external doors should be properly secured against unauthorized controlled entry (e.g. bars, alarms, locks); Doors and windows should be locked when the windows are unattended and external security, especially at ground level, should be considered;
  3. There should be a manned reception area or other methods of physical access control for the site or building and only authorized personnel can access to sites and buildings.
  4. Physical barriers to prevent unauthorized physical access and environmental contamination should be built, wherever applicable;
  5. All fire doors should be alerted, monitored and tested alongside walls in order to determine the level of resistance needed in accordance with appropriate state, national and international standards; should act in a failsafe fashion in accordance with the Local Code;
  6. Appropriate intrusion detection systems, according to the national, regional, or international standards shall be installed and tested regularly for the coverage of all exterior doors and accessible windows. Unoccupied areas should be alarmed at all times.
  7. Organization-controlled information management facilities should be segregated physically from those operated by outside parties.

When you gambled with safety, you bet your life”

Other Information- The physical protection of the organization’s premises and information processing facilities can be achieved by creating one or several physical barriers. Additional protection is offered by using multiple barriers when a single barrier failure does not immediately affect security.

Related Product : ISO 27001 Lead Auditor Training And Certification ISMS

A protected space may be a closed office or multiple rooms that are enclosed with an internal physical protection restriction. Additional barriers and perimeters for the physical access control between areas with various security requirements within the safety perimeter may be necessary. And in the case of buildings with assets for multiple organizations, special attention to be given to physical security of entry.

The use of physical controls especially for the safe areas, as set out in the risk assessment, needs to be adjusted to the technical and economic circumstances of the organization.

The Organization wishes that its information to remain within the CIA triads. They also ensure that the physical security controls are properly and efficiently implemented to protect the confidentiality, authenticity and/or integrity of the organization’s information and information processing facilities. The physical and environmental protection of the company is covered in Annex 11 of ISO 27002 . This famous certification of lead auditor and lead implementer covers all the annexes to the security of information by implementing appropriate access controls to ensure authorized access to protect the organization. Infosavvy , a Mumbai-based institute, offers certifications and training for multiple-domain-like management of information security, cybersecurity, and many others, including the IRCA CQI ISO 27001:2013 Lead Auditor (LA) and ISO 27001 Lead Implementer (LI) (TÜV SÜD Certification). This certification covers several audits to keep an organization safe from the intended destructor. Infosavvy will help you to understand and identify the full extent of the physical and environmental security of your organization that is necessary to protect the operations of your organization from attacks. We have trained trainers who have ample know-how and experience in order to make sure that the information security is effectively handled. The applicant will, therefore, gain the skills needed to conduct the ISMS audit using commonly agreed audit concepts, procedures and techniques

Also Read : ISO 27001 Annex : A.10 Cryptography

A.11.1.2 Physical Entry Controls

Control- Appropriate access controls should protect places to ensure that only authorized employees are allowed access.

Implementation Guidance- The following points should be taken into consideration:

  1. Visitors should be registered on the date and time of their entry and departure and should supervise all visitors, without prior approval of their access; Access should be given for certain approved purposes only, and guidelines should be provided regarding safety and emergency procedures specifications for the region. Visitors’ identity should be authorized using a suitable means;
  2. Access should be limited to areas where information is processed or stored by means of suitable access controls, for example, the introduction of a two-factor authentication system, such as an access card and a secret PIN;
  3. Securely maintaining and monitoring of a physical logbook or electronic audit trail of all access records;
  4. Every employee, contractor and an external person should wear some visible identification and should inform security personnel immediately if they meet unescorted people and anyone who does not have visible ID;
  5. Limited access to secure areas or confidential information processing facilities should only be allowed to the employee who is external support services when necessary; access authority and monitoring should be provided;
  6. Access privileges to protected areas should be periodically reviewed, updated and, revoked. where necessary.
Questions related to this topic
  1. What are the types of perimeter barriers?
  2. What are perimeter controls?
  3. What are the 5 physical security controls required for information security?
  4. What are the three routes possible for data interception According to NIST?
  5. What is ISO 27001 Annex : A.11 Physical and Environmental Security?
  6. what are the controls of ISO 27001 Annex : A.11 Physical and Environmental Security?

ISO 27001 Requirements


Clause 4.2 Understanding the needs and expectations of interested parties 
Clause 4.4 Information security management system
Clause 4.3 Determining the scope of the information security management system
Clause 5.1 Leadership and commitment
Clause 5.2 Policy
Clause 5.3 Organizational roles, responsibilities and authorities 
Clause 6.1 Actions to address risks and opportunities
Clause 6.1.2 Information security risk assessment process
Clause 6.1.3 Information security risk treatment
Clause 6.2 Information security objectives & planning
Clause 7.1 Resources
Clause 7.2 Competence
Clause 7.3 Awareness
Clause 7.4 Communication
Clause 7.5 Documented information Implementation Guideline
Clause 8.1 Operational planning & control
Clause 8.2 Information security risk assessment
Clause 8.3 Information security risk treatment
Clause 9.1 Performance evaluation Monitoring, measurement, analysis & evaluation
Clause 9.2 Internal audit
Clause 9.3 Management review
Clause 10.1 Non conformity and corrective action
Clause 10.2 Continual Improvement 

ISO 27001 Annex A Controls


Annex A.5 Information Security Policies
Annex A.6 Organization of Information Security
Annex A.6.2 Mobile Devices and Teleworking
Annex A.7 Human Resource Security
Annex A.7.2 During Employment
Annex A.7.3 Termination and Change of Employment
Annex A.8 Asset Management
Annex A.8.1.3 Acceptable Use of Assets & A.8.1.4 Return of Assets
Annex A.8.2 Information Classification
Annex A.8.2.2 Labeling of Information & A.8.2.3 Handling of Assets
Annex A.8.3 Media Handling
Annex A.9 Access Control
Annex A.9.1.2 Access to Networks and Network Services
Annex A.9.2 User Access Management
Annex A.9.2.3 Management of Privileged Access Rights  
Annex A.9.2.4 Management of Secret Authentication Information of Users
Annex A.9.2.5 Review of User Access Rights 
Annex A.9.2.6 Removal or Adjustment of Access Rights
Annex A.9.3 User Responsibilities
Annex A.9.4 System and Application Access Control
Annex A.9.4.4 Use of Privileged Utility Programs 
Annex A.9.4.5 Access Control to Program Source Code
Annex A.10 Cryptography
Annex A.11.2 Equipment
Annex A.11.1.3 Securing Offices, Rooms and Facilities
Annex A.11.1.4 Protecting Against External and Environmental Threats
Annex A.11.1.5 Working in Secure Areas
Annex A.11.1.6 Delivery and Loading Areas
Annex A.11.2.4 Equipment Maintenance
Annex A.11.2.5 Removal of Assets
Annex A.11.2.6 Security of Kit and Assets Off-Premises
Annex A.11.2.7 Secure Disposal or Re-use of Equipment
Annex A.11.2.8 Unattended User Equipment
Annex A.11.2.9 Clear Desk and Clear Screen Policy
Annex A.12 Operations Security
Annex A.12.2 Protection from Malware
Annex A.12.3 Backup
Annex A.12.4 Logging and Monitoring
Annex A.12.5 Control of Operational Software
Annex A.12.6 Technical Vulnerability Management
Annex A.12.7 Information Systems Audit Considerations
Annex A.13 Communications Security
Annex A.13.2 Information Transfer
Annex A.13.2.3 Electronic Messaging
Annex A.13.2.4 Confidentiality or Non-Disclosure Agreements
Annex 14 System Acquisition, Development and Maintenance
Annex A.14.1.2 Securing Application Services on Public Networks
Annex A.14.1.3 Protecting Application Services Transactions
Annex A.14.2 Security in Development and Support Processes
Annex A.14.2.3 Technical Review of Applications after Operating Platform Changes
Annex A.14.2.4 Restrictions on Changes to Software Packages
Annex A.14.2.5 Secure System Engineering Principles
Annex A.14.2.6 Secure Development Environment
Annex A.14.2.7 Outsourced Development
Annex A.14.2.8 System Security Testing
Annex A.14.2.9 System Acceptance Testing
Annex A.14.3 Test data
Annex A.15 Supplier Relationships
Annex A.15.1.2 Addressing Security Within Supplier Agreements
Annex A.15.1.3 Information and Communication Technology Supply Chain
Annex A.15.2 Supplier Service Delivery Management
Annex A.16 Information Security Incident Management
Annex A.16.1.2 Reporting Information Security Events
Annex A.16.1.3 Reporting Information Security Weaknesses
Annex A.16.1.4 Assessment of and Decision on Information Security Events
Annex A.16.1.5 Response to Information Security Incidents
Annex A.16.1.6 Learning from Information Security Incidents
Annex A.16.1.7 Collection of Evidence
Annex A.17 Information Security Aspects of Business Continuity Management
Annex A.17.1.3 Verify, Review and Evaluate Information Security Continuity
Annex A.18 Compliance
Annex A.18.1.3 Protection of Records
Annex A.18.1.4 Privacy and Protection of Personally Identifiable Information
Annex A.18.1.5 Regulation of Cryptographic Controls
Annex 18.2 Information Security Reviews

About ISO 27002



This Blog Article is posted by
Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com

Leave a Comment