Cabling is easy to overlook — until it fails.
When it does, entire services disappear instantly.
Annex A 7.12 exists to ensure organisations protect power and telecommunications cabling from interception, damage, and interference, safeguarding both information security and operational continuity.
This control is about protecting the infrastructure that everything else relies on.

Annex A 7.12 of ISO 27001:2022 focuses on cabling security.
At a practical level, this means:
The control does not require specialist engineering everywhere. It expects deliberate, proportionate protection based on risk and criticality.
Cables carry:
If cabling is:
…the impact is often immediate and widespread.
Annex A 7.12 recognises that cabling represents:
Protecting cabling is therefore essential for availability, integrity, and confidentiality.
A pragmatic approach to Annex A 7.12 typically includes the following elements.
Organisations should identify cabling that:
This includes network, telecommunications, and power cabling.
You cannot protect what you have not identified.
Cabling should be protected from accidental or deliberate damage.
Controls may include:
Physical damage is one of the most common cabling failures.
Access to cabling infrastructure should be controlled where risk justifies it.
This may include:
Unrestricted access increases both sabotage and interception risk.
Annex A 7.12 supports reducing the risk of:
This may involve:
The level of protection should reflect sensitivity and threat.
Where feasible and justified by risk, organisations may consider:
Where underground routing is not practical, alternative protection should be applied.
ISO 27001:2022 places increased emphasis on cable identification.
Organisations should consider:
Clear labelling supports:
Unidentified cables increase operational and security risk.
Cabling protection degrades over time.
Organisations should:
Silent degradation is common until failure occurs.
Where cabling is shared with other organisations or third parties, additional risk exists.
Organisations should consider:
Shared infrastructure requires explicit risk management.
Annex A 7.12 does not require:
It does require organisations to:
Cabling failures are often blamed on “infrastructure” — but they are information security failures.
Cabling risk grows quietly as environments change.
Annex A 7.12 is about protecting the arteries of your information systems.
When cabling security is managed effectively:
Servers, systems, and networks get the attention.
Annex A 7.12 ensures the cables that connect them are not ignored.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today