WikiFrameworksISO/IEC 27001:2022Security of Assets Off-Premises

Security of Assets Off-Premises

Updated: 2026-02-17

Plain English Translation

ISO 27001 Annex A.7.9 requires organizations to protect their physical assets—such as laptops, mobile phones, removable media, and paper records—when they are taken outside official facilities. This involves implementing rules and technical controls to secure company devices offsite, whether employees are working from home, traveling, or commuting, thereby minimizing the risk of theft, loss, or unauthorized access.

Executive Takeaway

Securing assets outside the traditional office perimeter is essential to prevent data breaches resulting from lost, stolen, or compromised remote devices.

ImpactHigh
ComplexityMedium

Why This Matters

  • Mitigates the risk of unauthorized access to sensitive data when physical devices are lost or stolen in public spaces.
  • Ensures compliance with regulatory frameworks that mandate strict protection of personal and corporate data, regardless of the physical location of the hardware.

What “Good” Looks Like

  • All portable devices are centrally managed, fully encrypted, and equipped with remote wipe capabilities, with device ownership and assignment tracking supported by tools like WatchDog Security's Asset Inventory.
  • A formal policy dictates acceptable use, travel restrictions, and immediate incident reporting procedures for lost equipment.

ISO 27001:2022 control A.7.9 is a physical security control requiring that any assets taken off-site, such as laptops, phones, or paper records, must be protected against theft, compromise, and unauthorized access.

Organizations secure company devices offsite by enforcing strong passwords, enabling full-disk encryption, utilizing Mobile Device Management (MDM) software for remote tracking and wiping, and training employees on how to protect company laptops when working from home.

Organizations typically need a mobile device security policy, a remote work security checklist, and an overarching Asset Management Policy that dictates acceptable use, physical protection requirements, and reporting duties for assets outside the office.

Best practices to secure laptops while traveling for work include never leaving devices unattended in vehicles or hotel rooms, using privacy screens, avoiding public Wi-Fi without a VPN, and keeping devices as carry-on luggage.

While full disk encryption requirements for company laptops are a critical baseline component, they must be combined with strong authentication, physical security awareness, and timely incident reporting to fully satisfy the control.

A lost or stolen laptop procedure ISO 27001 compliant workflow requires employees to immediately report the loss, allowing the IT team to execute a remote wipe, revoke access credentials, and log the security incident.

Auditors will look for an approved laptop security policy, MDM configuration screenshots showing encryption and remote wipe capabilities, and an active inventory tracking off-site assets and assignments. WatchDog Security's Compliance Center can help organize this evidence by control and highlight gaps when required artifacts or screenshots are missing.

Implementing mobile device management MDM for ISO 27001 compliance is highly recommended and widely considered the industry standard, as it provides the necessary centralized control to enforce encryption, push updates, and remotely wipe compromised remote work devices.

Organizations should maintain a centralized asset inventory mapping users to specific hardware, and require signed acknowledgments during the offsite equipment checkout and return process, ensuring individuals accept formal responsibility for the devices.

Physical security controls for devices in transit and paper records require them to be kept in locked briefcases or lockboxes, never left unattended in public spaces, and securely shredded or wiped when no longer needed.

Auditors typically want to see that each off-site asset has an owner, baseline protections, and evidence that controls are enforced over time. WatchDog Security's Asset Inventory can help maintain an accountable mapping of users to devices and produce exportable inventories that support A.7.9 evidence collection.

ISO-27001 A.7.9

"Off-site assets shall be protected."

VersionDateAuthorDescription
1.0.02026-02-17GRC TeamInitial publication