ISO 27001:2022 Annex A 7.6 – Working in Secure Areas Explained

A secure area is only secure if behaviour inside it is controlled.

Annex A 7.6 exists to ensure organisations apply specific security measures to how people work within secure areas, reducing the risk of accidental or deliberate compromise of information and supporting assets.

This control recognises a simple truth:
Authorised access does not remove risk.

ISO 27001

Quick Guide: Annex A 7.6 at a Glance

Annex A 7.6 of ISO 27001:2022 focuses on secure working practices within secure areas.

At a practical level, this means:

  • Defining how secure areas are used
  • Restricting and supervising activities carried out inside them
  • Controlling devices and recording equipment
  • Maintaining security when areas are unoccupied
  • Ensuring emergency procedures are available

The control does not rely on perimeter controls alone. It expects organisations to manage behaviour, activity, and tools within secure areas deliberately.

In-Depth Guide to Annex A 7.6

What Is Annex A 7.6 and Why Does It Matter?

Secure areas often house:

  • Critical systems and infrastructure
  • Sensitive information or records
  • Backup media
  • Network and communications equipment

Even when access is restricted, risks remain:

  • Accidental damage to equipment
  • Unauthorised observation or recording
  • Misuse of devices
  • Insider threat or negligent behaviour

Annex A 7.6 ensures organisations do not assume that authorised presence equals safe behaviour, and instead apply additional controls to how work is carried out in secure areas.

This control replaces and expands on ISO 27001:2013 Annex A 11.1.5, reflecting modern risks such as mobile devices and recording capability.

How to Implement Annex A 7.6 Effectively

A pragmatic approach to Annex A 7.6 typically includes the following elements.

1. Define Secure Areas and Permitted Activities

Organisations should clearly define:

  • Which areas are designated as secure
  • What activities are permitted in those areas
  • Who is authorised to work there

This information should be shared on a need-to-know basis.

Unclear boundaries create inconsistent behaviour.

2. Prevent Unsupervised Activities Where Risk Justifies It

In some secure areas, unsupervised working increases risk.

Organisations may:

  • Require supervision or dual control
  • Restrict lone working
  • Limit time spent in secure areas

The level of supervision should reflect the sensitivity of the assets involved.

3. Maintain Security When Secure Areas Are Unoccupied

Security should not depend on constant presence.

Organisations should ensure:

  • Secure areas are locked when not in use
  • Periodic checks are performed
  • Access points remain controlled

Unoccupied areas are often targeted because oversight is assumed.

4. Control the Use of Recording Equipment

Recording devices present a significant risk in secure areas.

Annex A 7.6 expects organisations to:

  • Restrict or prohibit unauthorised recording
  • Apply formal authorisation for audio, video, or photographic equipment
  • Consider the recording capability of modern devices

Recording controls should be explicit, not implied.

5. Apply Controls to Personal and Portable Devices

Modern devices combine convenience with risk.

Organisations should consider controls for:

  • Laptops and tablets
  • Smartphones and wearable devices
  • Removable media

Controls may include restriction, configuration, supervision, or prohibition, depending on risk.

6. Make Emergency Procedures Easily Accessible

People working in secure areas should be able to:

  • Respond safely to emergencies
  • Exit without confusion or delay
  • Protect life without compromising security unnecessarily

Emergency procedures should be visible, accessible, and understood.

Safety and security must work together, not compete.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Practical Considerations

Annex A 7.6 does not require:

  • Zero trust of authorised staff
  • Blanket bans on all devices
  • Excessive supervision everywhere

It does require organisations to:

  • Recognise that secure areas amplify risk
  • Apply controls to behaviour, not just access
  • Reflect modern working practices and technologies

Most incidents in secure areas are accidental, not malicious.

Common Challenges and How to Overcome Them

  • Assuming access control alone is sufficient
  • Manage how people work inside secure areas
  • Uncontrolled use of mobile or recording devices
  • Define and enforce device and recording rules
  • Secure areas left unlocked when unattended
  • Apply clear procedures for unoccupied areas
  • Emergency procedures overlooked
  • Ensure safety information is visible and accessible

Secure areas fail when familiarity replaces discipline.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Final Recommendations

Annex A 7.6 is about protecting high-value assets from authorised risk.

When working in secure areas is controlled effectively:

  • Accidental damage is reduced
  • Insider and observational risk is controlled
  • Sensitive information remains protected
  • Security remains effective even during routine work

Access gets people inside.
Annex A 7.6 ensures they behave securely once they are there.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

The Annex Control Table

ISO 27001:2022 Organisational Controls
ISO 27001:2022 Technological Controls