WikiFrameworksISO/IEC 27001:2022Equipment Siting and Protection

Equipment Siting and Protection

Updated: 2026-02-17

Plain English Translation

ISO 27001 Annex A.7.8 requires organizations to purposefully position and protect their physical IT equipment—such as servers, routers, printers, and workstations—to minimize risks. This means keeping critical hardware away from environmental hazards like water pipes or extreme heat, locking away network infrastructure to prevent tampering, and positioning monitors so sensitive information cannot be viewed by unauthorized visitors.

Executive Takeaway

Strategic physical placement and protection of IT hardware prevent accidental damage, environmental destruction, and unauthorized physical tampering.

ImpactMedium
ComplexityMedium

Why This Matters

  • Reduces the likelihood of costly hardware damage and downtime caused by environmental factors like water leaks, fires, or power surges.
  • Prevents malicious actors or unauthorized guests from easily intercepting data, tampering with network devices, or viewing exposed screens.

What “Good” Looks Like

  • Critical infrastructure is housed in secure, dedicated facilities free from environmental hazards and public access.
  • Office workstations and printers are positioned to prevent shoulder surfing, and physical access to all network infrastructure is strictly limited.

It requires organizations to locate and protect their equipment in a way that minimizes physical and environmental risks, as well as opportunities for unauthorized access or tampering.

Practical examples include locking network switches in dedicated closets, positioning monitors away from windows to prevent shoulder surfing, and keeping servers away from water pipes, hazardous materials, or heavy foot traffic.

ISO 27001 A.7.8 audit evidence examples include an approved Physical Security Policy, floor plans showing secure equipment placement, facility risk assessments, and compliance reports (like ISO 27001 or SOC 2) from third-party data centers. Tools like WatchDog Security's Compliance Center can help organize evidence to A.7.8, track collection status, and surface missing artifacts during readiness reviews.

To protect IT equipment from environmental threats (fire, water, heat), organizations should use raised floors to mitigate flood risks, implement fire suppression systems, install redundant HVAC for temperature control, and use uninterruptible power supplies (UPS).

Yes, organizations are responsible for ensuring their third-party providers implement appropriate equipment siting and protection controls, typically verified by collecting and reviewing the provider's independent security audit certifications. WatchDog Security's Vendor Risk Management can help maintain a vendor catalog, request/track attestations, and record review outcomes tied back to A.7.8 requirements.

Monitors should be angled away from public view, printers processing sensitive data should be placed in restricted zones behind access controls, and active network ports in public areas should be disabled or physically locked.

Organizations should store networking devices in locked IT closets, use locked server racks, employ tamper-evident seals, and secure cabling in conduits or drop ceilings to prevent unauthorized interception or damage.

Electromagnetic leakage shielding ISO 27001 controls are generally only necessary if the organization's physical security risk assessment identifies a high risk of electromagnetic interception, which is typically only applicable to highly classified government or military data.

Reviews should occur at planned intervals (e.g., annually), during facility physical security risk assessments, or whenever there are significant changes to the office layout, building infrastructure, or threat landscape.

It directly replaces the ISO 27001:2013 control A.11.2.1 (Equipment siting and protection), carrying forward the same core principles while aligning with modern physical and environmental threat landscapes.

Equipment siting often creates repeatable decisions (where assets are placed, what hazards exist, and what mitigations are required). Tools like WatchDog Security's Risk Register can document location-specific risks, assigned owners, and treatment actions, while WatchDog Security's Compliance Center can map those actions to A.7.8 and highlight gaps during audits.

Audits typically require collecting and controlling sensitive supporting artifacts (policies, site assessments, facility diagrams, and third-party certifications). WatchDog Security's Secure File Sharing can help distribute and store these files with access controls and audit logs, and WatchDog Security's Compliance Center can organize them as evidence linked to A.7.8 for faster retrieval.

ISO-27001 A.7.8

"Equipment shall be sited securely and protected."

VersionDateAuthorDescription
1.0.02026-02-17WatchDog Security GRC TeamInitial publication