ISO 27001:2022 Annex A 7.2 – Physical Entry Explained

Physical access is the last step before compromise — once someone is inside, many other controls are already bypassed.

Annex A 7.2 exists to ensure organisations control physical entry to secure areas, so only authorised individuals are able to access locations where information and associated assets are processed, stored, or managed.

This control turns physical boundaries into actively enforced access control, not assumed security.

ISO 27001

Quick Guide: Annex A 7.2 at a Glance

Annex A 7.2 of ISO 27001:2022 focuses on physical entry controls.

At a practical level, this means:

  • Restricting physical entry to authorised individuals
  • Using appropriate entry control mechanisms
  • Identifying and authenticating people before entry
  • Controlling visitor and delivery access
  • Preventing unauthorised access to secure areas

The control does not mandate specific technologies. It expects appropriate entry controls based on risk, environment, and asset sensitivity.

In-Depth Guide to Annex A 7.2

What Is Annex A 7.2 and Why Does It Matter?

Once a person gains physical access:

  • Logical access controls are easier to bypass
  • Devices can be stolen or tampered with
  • Credentials can be observed or captured
  • Systems can be interfered with directly

Many serious breaches begin with simple physical access.

Annex A 7.2 ensures organisations do not rely on trust, signage, or assumption, but actively control who is allowed to enter secure areas.

This control applies to:

  • Offices and facilities
  • Server rooms and communications areas
  • Records storage
  • Any location where sensitive information or systems exist

If access matters, entry must be controlled.

How to Implement Annex A 7.2 Effectively

A pragmatic approach to Annex A 7.2 typically includes the following elements.

1. Identify Areas Requiring Controlled Entry

Organisations should identify which areas require restricted access based on:

  • Sensitivity of information
  • Criticality of systems
  • Risk of damage, theft, or disruption

Not all areas require the same level of control.

2. Implement Appropriate Entry Control Mechanisms

Entry controls may include:

  • Physical keys or locks
  • Electronic access cards or fobs
  • PINs or keypads
  • Biometric controls
  • Turnstiles or mantraps

Controls should be proportionate to risk and practical to operate.

3. Ensure Only Authorised Individuals Can Enter

Access rights should be:

  • Granted based on role and need
  • Approved by appropriate authority
  • Removed or updated promptly when roles change

Entry control systems should reflect current access decisions, not historical convenience.

4. Identify Individuals Before Entry

Annex A 7.2 expects organisations to know who is entering secure areas.

This may involve:

  • Access badges or ID cards
  • Verification by reception or security staff
  • Electronic identification through access systems

Anonymous access undermines accountability.

5. Manage Visitor Access Deliberately

Visitors present a common entry risk.

Organisations typically:

  • Register and identify visitors
  • Restrict visitor access to authorised areas
  • Escort visitors where appropriate
  • Recover visitor passes on exit

Visitor access should never be implicit.

6. Control Delivery and Loading Areas

Delivery and loading points are frequent weak spots.

Organisations should consider:

  • Separating delivery areas from secure zones
  • Restricting access beyond delivery points
  • Supervising deliveries where necessary

These areas should not provide uncontrolled access to operational spaces.

7. Monitor and Review Physical Entry

Entry control effectiveness should be reviewed periodically.

This may include:

  • Reviewing access rights
  • Checking for shared or tailgated access
  • Verifying controls still align with building layout and use

Physical access risk changes as environments evolve.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Practical Considerations

Annex A 7.2 does not require:

  • High-cost biometric systems everywhere
  • Security guards at every entrance
  • Zero tolerance for convenience

It does require organisations to:

  • Understand where physical entry creates information risk
  • Apply controls deliberately
  • Prevent casual or unauthorised access

Physical entry controls should be visible, enforced, and maintained.

Common Challenges and How to Overcome Them

  • Tailgating or shared access
  • Reinforce individual entry and awareness
  • Outdated access permissions
  • Review access when roles or locations change
  • Visitors roaming unescorted
  • Define and enforce visitor management rules
  • Delivery areas bypassing security
  • Separate and supervise delivery access

Most physical breaches exploit convenience, not force.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Final Recommendations

Annex A 7.2 is about ensuring physical presence is authorised, intentional, and accountable.

When physical entry is controlled effectively:

  • Information and systems are better protected
  • Insider and outsider risks are reduced
  • Other security controls operate as intended
  • Accountability is clear

Physical access is powerful.
Annex A 7.2 ensures it is earned, not assumed.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

The Annex Control Table

ISO 27001:2022 Organisational Controls
ISO 27001:2022 Technological Controls