Physical Entry
Plain English Translation
ISO 27001 Annex A.7.2 requires organizations to protect secure areas, such as corporate offices, server rooms, and data centers, by implementing appropriate physical entry controls. This means ensuring that only authorized personnel can walk into restricted zones by using mechanisms like electronic badge readers, staffed reception desks, and visitor logs, thereby preventing physical tampering or theft of sensitive assets.
Technical Implementation
Use the tabs below to select your organization size.
Required Actions (startup)
- Ensure all external office doors remain locked and require a physical key or basic PIN pad for entry.
- Implement a paper or basic digital logbook at the front desk to record visitor entry and exit times.
Required Actions (scaleup)
- Deploy a centralized electronic badge access system that integrates with your HR platform to automatically provision and revoke access.
- Establish an explicit secure area access control policy template for internal IT closets, restricting access to designated engineers only.
Required Actions (enterprise)
- Utilize advanced data center access control mechanisms such as biometric scanners, turnstiles, and anti-tailgating technologies.
- Integrate physical access logs with the primary SIEM to automatically flag anomalies, such as an employee badging into the office while simultaneously logging in from a remote VPN.
ISO 27001:2022 Annex A.7.2 is a physical security control that requires secure areas to be protected by appropriate entry controls and access points, ensuring only authorized personnel can enter.
Effective physical entry controls ISO 27001 expects include electronic keycard readers, biometric scanners, staffed reception areas, physical turnstiles, and locked IT closets.
You implement an ISO 27001 visitor management procedure that requires all guests to sign a log, present photo ID, wear a visible visitor badge, and remain escorted by a WatchDog Security employee while on the premises. WatchDog Security's Policy Management can store the procedure, track acknowledgements for staff who execute it, and keep version history when the process changes.
ISO 27001 physical access audit evidence typically includes a physical security policy, visitor logs from the past 30 days, badge system access reports, and compliance certificates from cloud or data center providers. WatchDog Security's Compliance Center can map these artifacts to A.7.2 and keep them organized as audit-ready evidence, and WatchDog Security's Secure File Sharing can be used to share selected logs or reports with auditors using access controls and audit logs.
Yes, physical access logs ISO 27001 requirements state that entry to highly secure areas must be recorded and maintained to provide an audit trail for incident investigations and access reviews.
Badge access system provisioning and revocation must follow a formalized access control process, requiring documented approval before issuance and immediate deactivation upon an employee's termination or role change.
While not strictly required for standard office environments, biometric scanners are highly recommended as data center access control best practices to protect highly restricted zones where stolen keycards pose a significant risk.
These points should be secured by integrating them into the perimeter defense strategy, utilizing mantrap access control best practices for sensitive entryways, and isolating loading bays from internal information processing facilities.
Contractors and delivery personnel must follow the formal visitor management process. Their identities must be verified, their access restricted to necessary areas, and they must be supervised appropriately.
While A.7.1 defines the physical boundaries (like walls and fences) around a secure area, A.7.2 dictates the specific physical access control mechanisms (like badge readers and door locks) used to govern who can pass through those boundaries.
Physical entry evidence is often scattered across facilities teams, access control systems, and paper visitor logs, making audits slow and error-prone. WatchDog Security's Compliance Center can map A.7.2 evidence requirements, assign owners, and keep visitor logs, badge reports, and access reviews organized for auditor requests.
If you rely on a colocation provider or managed office, you still need proof that their entry controls meet your requirements and that certifications are current. WatchDog Security's Vendor Risk Management can track the provider, collect their SOC 2/ISO certificates, and schedule recurring reviews so renewals and exceptions are documented.
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-17 | WatchDog Security GRC Team | Initial publication |