ISO 27001:2022 Annex A 7.3 – Securing Offices, Rooms and Facilities Explained

Once someone is inside the building, security failure becomes a proximity problem.

Annex A 7.3 exists to ensure organisations secure offices, rooms, and facilities that contain information or information processing assets, reducing the risk of unauthorised access, damage, or interference.

This control goes beyond perimeter and entry controls. It focuses on what happens inside the boundary.

ISO 27001

Quick Guide: Annex A 7.3 at a Glance

Annex A 7.3 of ISO 27001:2022 focuses on securing offices, rooms, and facilities.

At a practical level, this means:

  • Protecting areas where sensitive information is processed or stored
  • Preventing unauthorised access to internal spaces
  • Reducing opportunities for theft, tampering, or observation
  • Making security-sensitive areas less obvious
  • Aligning physical protection with information risk

The control does not require uniform security across all spaces. It expects proportionate protection based on sensitivity and risk.

In-Depth Guide to Annex A 7.3

What Is Annex A 7.3 and Why Does It Matter?

Not all areas inside a building carry the same risk.

Higher-risk areas often include:

  • Offices handling sensitive or confidential information
  • Rooms containing servers, network equipment, or backups
  • Areas where sensitive discussions take place
  • Locations storing paper records or removable media

If these spaces are not secured:

  • Information can be overheard or observed
  • Assets can be stolen or tampered with
  • Incidents may occur without detection

Annex A 7.3 ensures organisations identify and protect internal spaces deliberately, rather than assuming perimeter controls are sufficient.

How to Implement Annex A 7.3 Effectively

A pragmatic approach to Annex A 7.3 typically includes the following elements.

1. Identify Security-Sensitive Offices, Rooms and Facilities

Organisations should identify which internal areas require additional protection, based on:

  • Information sensitivity
  • Asset criticality
  • Risk of unauthorised access or observation

This assessment drives the level of control required.

2. Control Access to Internal Areas

Access to sensitive areas should be restricted.

This may involve:

  • Locked doors or cupboards
  • Access control systems
  • Restricted keys or credentials

Access should be granted based on role and need, not convenience.

3. Reduce Visibility of Sensitive Activities

Where appropriate, organisations should limit how easily sensitive activities can be observed.

This may include:

  • Locating sensitive functions away from public or shared areas
  • Using privacy screens or frosted glass
  • Avoiding visible signage that highlights security-sensitive functions

Security improves when sensitive areas are discreet.

4. Protect Against Observation and Eavesdropping

Annex A 7.3 supports protecting information from being:

  • Seen
  • Heard
  • Captured unintentionally

Controls may include:

  • Soundproofing or layout considerations
  • Restrictions on open conversations
  • Protection against visual or electromagnetic leakage

The risk depends on context, not paranoia.

5. Apply Monitoring and Detection Where Justified

Some areas may justify additional monitoring.

This could include:

  • CCTV coverage
  • Intruder detection
  • Alarmed doors or cabinets

Monitoring should be proportionate, lawful, and clearly governed.

6. Secure Equipment and Records Within Rooms

Securing a room is not enough if assets inside are exposed.

Organisations should consider:

  • Locking cabinets or racks
  • Securing portable devices
  • Protecting paper records

Layered protection reduces single-point failure.

7. Maintain and Review Physical Security Measures

Physical layouts and usage change over time.

Organisations should:

  • Review security when rooms are repurposed
  • Adjust controls when information sensitivity changes
  • Maintain locks, alarms, and monitoring systems

Degraded controls create a false sense of security.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Practical Considerations

Annex A 7.3 does not require:

  • Turning offices into restricted facilities
  • Excessive or intrusive surveillance
  • Identical controls in every room

It does require organisations to:

  • Understand where internal risk exists
  • Apply controls deliberately
  • Avoid relying on informal norms

Internal security fails most often through familiarity and assumption.

Common Challenges and How to Overcome Them

  • Assuming internal areas are low risk
  • Identify and protect security-sensitive spaces
  • Sensitive activities visible or audible to others
  • Adjust layout and behaviour deliberately
  • Unsecured equipment within secured rooms
  • Apply layered protection
  • Controls degrading as spaces change use
  • Review security when rooms or functions change

Internal access is rarely forced — it is usually allowed by design.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Final Recommendations

Annex A 7.3 is about protecting information where it is actually used.

When offices, rooms, and facilities are secured effectively:

  • Internal threats are reduced
  • Sensitive information is less exposed
  • Physical and logical controls reinforce each other
  • Security becomes part of the environment, not an afterthought

Perimeters stop people getting in.
Annex A 7.3 ensures the right protection exists once they are inside.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

The Annex Control Table

ISO 27001:2022 Organisational Controls
ISO 27001:2022 Technological Controls