Once an attacker gets a foothold, they don’t stop at one system.
They move sideways — unless the network stops them.
Annex A 8.22 exists to ensure organisations segregate networks appropriately, restricting traffic between network domains to reduce the spread of incidents and protect sensitive information.
This control is about containing impact, not just keeping attackers out.

Annex A 8.22 of ISO 27001:2022 focuses on network segregation.
At a practical level, this means:
The control does not mandate a specific segmentation model. It expects deliberate, risk-based separation aligned with business need.
In flat or poorly segmented networks:
Common examples include:
Annex A 8.22 ensures organisations limit how far an attacker, error, or failure can travel once inside the environment.
This control replaces ISO 27001:2013 Annex A 13.1.3 and strengthens expectations around risk-based segmentation and wireless access.
A pragmatic approach to Annex A 8.22 typically includes the following elements.
Organisations should identify logical or physical network domains based on:
Typical domains may include:
Clear definition is essential before segregation can be applied.
Each network domain should be assessed based on:
Higher-risk domains should receive:
Segmentation should follow risk — not convenience.
Annex A 8.22 expects organisations to control how information flows between networks.
This typically involves:
Only required traffic should be permitted.
Everything else should be blocked by default.
Network boundaries should be:
Security perimeters help ensure:
Implicit or undocumented boundaries are not defensible.
Where access between networks is required, controls should consider:
Access decisions should align with:
Network segregation without access control is incomplete.
ISO 27001:2022 places additional emphasis on wireless networks.
Organisations should consider:
Wireless networks are a common entry point for attackers.
Connections to suppliers, partners, or managed service providers should be:
External connectivity expands the attack surface and should never be unrestricted.
Organisations should prevent:
Bridging often defeats segregation entirely.
Annex A 8.22 supports maintaining documentation such as:
Documentation supports:
If segregation exists only in people’s heads, it will fail.
Segregation should be reviewed:
Networks drift over time. Segregation must be maintained deliberately.
Annex A 8.22 does not require:
It does require organisations to:
Most major breaches spread because networks allow them to.
Segmentation failures are architectural, not accidental.
Annex A 8.22 is about limiting how far problems can travel.
When network segregation is implemented effectively:
You don’t prevent every compromise.
You prevent it from becoming catastrophic.
Annex A 8.22 ensures organisations design networks that contain risk by default.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today