Physical Controls (Domain 7)

Physical security is the foundation that all digital security controls rest on. An organization with perfect MFA, flawless vulnerability management, and a mature SIEM can have its entire security posture bypassed by an adversary who walks into an unlocked server room and plugs in a rogue device. Physical controls are not a secondary concern — they are the layer that makes every other layer meaningful.

Domain 7 is the smallest numbered domain in Annex A but covers controls of substantial consequence. Control 7.14 (secure disposal) is one of the most commonly under-evidenced controls in Indonesian organizations — devices disposed of through informal channels or without documented secure wiping create data exposure that persists after the equipment leaves the organization. Control 7.4 (physical security monitoring), introduced in 2022, formalizes the requirement for continuous or risk-based monitoring of physical premises — a control that many organizations have implemented informally through CCTV but have never made a documented ISMS activity.

This article covers all 14 physical controls with full implementation guidance, the scope applicability matrix for organizations of different types (particularly for cloud-native and hybrid organizations navigating which controls apply to them), and a pre-audit physical security checklist organized for efficient evidence gathering.

Domain 7 Sub-Group Structure

The 14 physical controls are organized into 7 sub-groups following the physical security lifecycle — from defining boundaries to disposing of equipment at end-of-life:

Sub-groupControlsCoverage
Physical perimeters and entry (7.1–7.3)7.1–7.3Define and secure physical boundaries around areas containing information assets. Control who can enter and establish secure area working rules.
Physical security monitoring (7.4)7.4 ★NEW in 2022 — Monitor premises for unauthorized physical access using CCTV, alarms, or security personnel. The new control reflecting the convergence of physical and information security.
Environmental protections (7.5–7.6)7.5–7.6Protect against physical and environmental threats (fire, flood, power failure) and define rules for working in secure areas.
Clear desk and screen (7.7)7.7Require a clear desk policy for papers and removable media and a clear screen policy for information processing facilities when unattended.
Equipment security (7.8–7.10)7.8–7.10Site and protect equipment, secure assets used off-premises, and manage storage media — covering hardware lifecycle from siting through off-site use.
Infrastructure and utilities (7.11–7.12)7.11–7.12Protect supporting utilities (power, cooling, water) and cabling infrastructure from damage, interference, or interception.
Equipment maintenance and disposal (7.13–7.14)7.13–7.14Maintain equipment correctly and ensure that all data is securely destroyed before equipment is disposed of or repurposed. One of the most commonly under-evidenced controls.

Complete Control Reference: All 14 Physical Controls

The complete reference table below covers all 14 controls. Each entry includes requirement summary, implementation guidance, evidence required, common gap, and Indonesian regulatory context. Control 7.4 is marked ★ as the one new control introduced in the 2022 revision:

Ref.Control nameRequirement & implementationEvidence requiredCommon gapReg. link

 

7.1Physical security perimeters

Req: Define and use security perimeters to protect areas that contain sensitive information and associated information processing facilities. Perimeters must be clearly defined, physically sound, and commensurate with the value of the assets they protect.

Impl: Identify all areas containing in-scope assets: server rooms, network equipment, paper document storage, executive offices with sensitive data. Define perimeter type per area: locked door (basic), alarmed zone (intermediate), access-controlled secure area (advanced). Document the perimeter map. Physical perimeters must have no gaps — check false ceilings, raised floors, shared wall partitions.

Physical security perimeter diagram. Access control configuration for each perimeter zone. Physical walkthrough evidence (photos, audit records). Visitor log for secure areas.Server room has a locked door but the false ceiling allows access from adjacent office space. Perimeter is not fully documented — auditors ask to see the perimeter map and cannot.POJK physical security requirements for financial institution IT facilities; BI payment system physical security standards

 

7.2Physical entry

Req: Secure areas must be protected by appropriate entry controls to ensure that only authorized personnel are allowed access. Entry controls must log and manage access.

Impl: For each perimeter zone: define who is authorized, what verification method is used (PIN, card, biometric), and how access is granted and revoked. Install access control readers for server rooms and other secure areas. Maintain access logs. Review access rights regularly — include physical access in the quarterly access review. Visitor management: sign-in, escort requirement, temporary access badge.

Access control system configuration showing authorized users per zone. Physical access logs (card reader exports). Visitor log for secure areas. Physical access review records — quarterly.Physical access logs not retained or reviewed. Visitors access secure areas unescorted. Former employees' physical access cards not deactivated on departure — same 4-hour SLA as digital access applies.POJK IT facility access control requirements; OJK data center physical security

 

7.3Securing offices, rooms and facilities

Req: Design and apply physical security for offices, rooms, and facilities. Security design should follow 'security by default' principles — not an afterthought.

Impl: Apply defense-in-depth to physical layout: reception buffer zone, general office access-controlled, server room highest restriction. Key design principles: no external signage identifying the location of sensitive assets, no visitor view of security systems, secure areas not visible through windows. Fire doors meet fire resistance standards. Server room: locked, ventilated, alarmed, temperature-controlled.

Floor plan with security zone markings. Server room security configuration checklist. Evidence of physical security review (last annual check). Access control for each zone.Server room visible through windows from public area. No fire suppression in server room. Security design never formally reviewed against requirements.Indonesian building security regulations; POJK IT facility security design

 

7.4 ★Physical security monitoring

Req: Premises must be monitored for unauthorized physical access. Monitoring must be continuous or risk-based and must cover all entry points to secure areas. Monitoring records must be retained and reviewed.

Impl: Deploy CCTV or equivalent monitoring at: main building entrances, server room entrance, secure area access points. Define retention period for monitoring recordings (typically 30–90 days, aligned with regulatory requirements). Assign monitoring review responsibility. Define the response procedure when unauthorized access is detected. For small organizations: alternative to CCTV includes security guard logs and alarm system records.

CCTV system configuration showing coverage points. Recording retention configuration. Monitoring review records (or alarm system test records). Response procedure for access anomalies.CCTV cameras present but recordings not retained long enough or not reviewed. No defined response procedure when anomaly detected. Coverage gaps at secondary entrances.POJK physical security monitoring for IT facilities; Indonesian private security and surveillance regulations

 

7.5Protecting against physical and environmental threats

Req: Design and apply physical protection against natural disasters, deliberate attacks, and accidents. Identify threats relevant to the location and implement appropriate countermeasures.

Impl: Identify physical threats for the specific location: flooding risk (Jakarta/coastal cities), earthquake risk (Java, Sumatra), fire risk, power failure, civil unrest. For each identified threat: implement countermeasure (elevated server room floor for flooding, UPS and generator for power, fire suppression for fire). Document the threat assessment and the controls implemented. Test controls annually (generator test, fire suppression test, UPS failover test).

Physical threat assessment document. Countermeasure implementation evidence per threat. Annual test records (generator, UPS, fire suppression). Environmental monitoring system records.Physical threat assessment never documented. Generator present but never tested. UPS capacity not verified against actual load. Jakarta flooding risk not addressed for ground-floor server rooms.Indonesian disaster risk regulations; POJK BCM and environmental risk for IT facilities

 

7.6Working in secure areas

Req: Design and apply procedures for working in secure areas. Minimize unsupervised work in secure areas. Control what can be brought into and out of secure areas.

Impl: Publish secure area working rules covering: no photography without authorization, no personal devices unless specifically approved, escorts required for non-authorized visitors, lone working in high-security areas requires defined controls, what can be removed from secure areas and how. Post rules at secure area entrances.

Secure area working rules document. Evidence of communication to authorized users. Visitor escort records. Records of any policy violations and response.Secure area working rules never written. Staff use personal phones freely in server room. No lone working controls for after-hours maintenance.POJK secure area access management; data center operational security requirements

 

7.7Clear desk and clear screen

Req: A clear desk policy for papers and removable media and a clear screen policy for information processing facilities must be defined and enforced. Sensitive information must not be left exposed when areas are unattended.

Impl: Define the clear desk policy: all papers filed or shredded when leaving desk, removable media stored securely, sensitive documents not left on printers. Define clear screen: automatic screen lock after defined inactivity period (≤5 minutes), manual lock required when leaving workstation. Conduct periodic walk-around audits to verify compliance. Connect violations to disciplinary process.

Clear desk and clear screen policy. Screen lock configuration evidence (GPO or MDM policy). Periodic walk-around audit records. Shredder availability evidence near work areas.Screen lock configured for 15+ minutes or disabled. Policy exists but never communicated to staff. No walk-around audits conducted — compliance is assumed.UU PDP physical protection of personal data; POJK information handling at workstations

 

7.8Equipment siting and protection

Req: Equipment must be sited and protected to reduce risks from environmental threats and hazards, and opportunities for unauthorized access. Physical layout must protect equipment.

Impl: Server racks not visible from reception or windows. UPS and power equipment protected from water exposure. Network switches and patch panels in locked cabinets. End-user equipment positioned so screens are not visible from public areas or from desk neighbor view if handling confidential data (privacy screens where warranted).

Equipment siting review records. Server room rack layout diagram. Privacy screen deployment evidence for sensitive workstations.Network switches in unlocked corridor cabinets. Server rack visible through glass office wall. Power and network cabling accessible to unauthorized persons.POJK IT equipment physical security; BI payment system equipment protection

 

7.9Security of assets off-premises

Req: Assets used off-premises must be protected. Laptops, mobile devices, and any equipment taken outside the organization's premises must be subject to security controls equivalent to those applied on-premises.

Impl: Define off-premises asset security requirements in the acceptable use policy and remote working policy: full disk encryption mandatory, screen lock required, no leaving devices unattended in public, report loss/theft within 1 hour. Maintain a register of assets authorized for off-site use. For high-sensitivity work in public: use privacy screens, avoid public WiFi for sensitive data.

Off-premises asset policy/procedure. Asset register noting off-site authorized status. Device encryption configuration evidence (BitLocker, FileVault). Incident records for lost/stolen devices and response time.Encryption not enabled on laptops taken off-site. No defined reporting procedure for lost devices. Lost device not reported for days — remote wipe not executed promptly.UU PDP protection of personal data on mobile devices; POJK mobile device security requirements

 

7.10Storage media

Req: Storage media must be managed through its lifecycle: acquisition, use, transportation, and disposal. Media containing sensitive data requires special handling and authorized disposal.

Impl: Maintain a register of all removable media (USB drives, external hard drives, backup tapes) containing in-scope data. Define authorization controls for removable media use. Encrypt removable media containing sensitive or personal data. For media transport: use approved courier with tracking. For media disposal: certificate of secure destruction required for media containing sensitive or personal data.

Removable media register. Media authorization and encryption policy. Encryption configuration for authorized removable media. Secure disposal certificates for disposed media.Removable media use uncontrolled — no register, no authorization process. Media containing backup data disposed of without secure deletion. USB drive policy exists but staff use personal USB drives freely.UU PDP physical media security for personal data; POJK IT media management requirements

 

7.11Supporting utilities

Req: Equipment must be protected from power failures and other disruptions caused by failures in supporting utilities. UPS for critical systems, generator for extended outages, power conditioning where required.

Impl: Map utility dependencies for all in-scope systems: power, cooling, water (for some cooling systems), internet connectivity. For each critical dependency: implement appropriate resilience (UPS for short outages, generator for extended, redundant ISP connections). Test annually. Monitor utility status continuously. Define response procedure for utility failures.

Utility dependency map for in-scope systems. UPS configuration and capacity verification (load vs. capacity). Generator test records (annual). Redundant ISP configuration evidence. Utility monitoring alerts.UPS present but never tested. Generator present but last test was 3+ years ago. UPS capacity not rechecked after new equipment added — may be over-capacity. Single ISP with no failover.POJK IT infrastructure availability requirements; BI payment system utility resilience standards

 

7.12Cabling security

Req: Power and telecommunications cabling carrying data or supporting information services must be protected from interception, interference, or damage. Physical cabling infrastructure must be documented.

Impl: Document all cabling routes in a cabling diagram. Protect data cables from physical damage: use conduit in high-risk areas, secure patch panels in locked cabinets. Separate power and data cabling runs to prevent interference. Label all cables clearly. Inspect cabling infrastructure annually as part of physical security audit.

Cabling diagram. Patch panel configuration (what is connected where). Annual cabling inspection records. Evidence of cable labeling.Cabling diagram never documented — 'tribal knowledge' of what connects to what. Unlabeled cables make changes risky and audit verification impossible. Data cables accessible in unlocked corridor cabinet.POJK cabling and communications infrastructure security

 

7.13Equipment maintenance

Req: Equipment must be correctly maintained to ensure its continued availability and integrity. Maintenance must follow manufacturer recommendations. Maintenance records must be retained.

Impl: Maintain an equipment maintenance schedule covering: UPS battery replacement cycle, server hardware maintenance contracts (vendor SLAs), generator servicing, HVAC/cooling system maintenance. Retain maintenance records. For externally maintained equipment: ensure maintenance only by authorized personnel, record all maintenance activities, verify equipment integrity after maintenance. Sensitive data must be removed before equipment leaves the organization's control for maintenance.

Equipment maintenance schedule per asset. Maintenance service records (vendor invoices/reports). Vendor authorization list for each equipment type. Pre-maintenance data removal confirmation records.Maintenance conducted but no records retained. Laptops sent for manufacturer repair without data removal (full disk encryption is the mitigation here). UPS batteries replaced ad hoc rather than on schedule.POJK equipment maintenance and availability; hardware vendor SLA monitoring

 

7.14Secure disposal or re-use of equipment

Req: All items of equipment containing storage media must be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use.

Impl: Define a secure disposal procedure covering: hard disk drives (NIST SP 800-88 media sanitization guidelines — overwrite, degauss, or physical destruction based on data sensitivity), SSDs (specific secure erase commands or physical destruction for high-sensitivity data), mobile devices (factory reset + MDM unenrollment), paper documents (cross-cut shredding). Obtain and retain destruction certificates from third-party disposal vendors. Personal data on disposed equipment must be permanently irrecoverable — relevant to UU PDP.

Secure disposal procedure. Asset disposal register showing method per device and date. Secure destruction certificates for disposed media. Third-party disposal vendor authorization records.Equipment disposed of without formal data wiping procedure. No destruction certificates obtained. SSDs 'formatted' rather than securely erased — formatting does not securely destroy data. Personal data on disposed equipment creates UU PDP exposure.UU PDP right to erasure and data permanence on disposed equipment; POJK IT asset disposal requirements; environmental regulations for e-waste

 

7.4 PHYSICAL SECURITY MONITORING — WHY IT MATTERSControl 7.4 is new in ISO 27001:2022 and represents the formalization of a control many organizations already have in place (CCTV) but have never documented as an ISMS control. The key requirements auditors look for: (1) monitoring covers all entry points to secure areas — not just the main entrance, (2) recordings are retained for a defined period with configuration evidence, (3) a response procedure exists for when monitoring detects an anomaly, and (4) monitoring is reviewed, not just passively recorded. An organization with CCTV that cannot answer 'what is your retention period?' or 'who reviews the footage and how often?' does not satisfy 7.4 despite having hardware in place.

Scope Applicability: Which Controls Apply to Your Organization

Domain 7 is the Annex A domain where scope decisions vary most significantly between organizations. A cloud-native technology company with no owned premises has a fundamentally different physical security profile than a financial institution with a regulated data center. The matrix below maps Domain 7 applicability for four common Indonesian organization scenarios:

Organization typeApplicable controlsTypically excludedNotes
Organization with own office and server room7.1 (perimeters), 7.2 (entry controls), 7.3 (securing offices), 7.4 (monitoring — NEW), 7.5 (environmental threats), 7.6 (working in secure areas), 7.7 (clear desk/screen), 7.8 (equipment siting), 7.9 (off-premises assets), 7.10 (storage media), 7.11 (supporting utilities), 7.12 (cabling), 7.13 (maintenance), 7.14 (secure disposal)None typically excluded — all 14 controls applyFull Domain 7 scope. Server room physical security is heavily tested at Stage 2. Access logs, CCTV coverage, environmental monitoring, and UPS test records are commonly requested evidence.
Fully cloud-native / fully remote organization (no own premises)7.7 (clear desk/screen — for remote workers), 7.9 (off-premises assets — laptops, mobile), 7.10 (storage media — portable devices), 7.13 (maintenance — end-user devices), 7.14 (secure disposal — laptops)7.1–7.6 (no physical premises or secure areas in scope). 7.8 (equipment siting applies to remote workers but may be partially scoped). 7.11–7.12 (no owned infrastructure).Must justify exclusions with specific rationale: 'Not applicable — the organization has no physical premises or owned server infrastructure; all processing occurs in cloud facilities managed by certified providers.' Physical security of cloud facilities is addressed through supplier security (5.23) rather than Domain 7.
Office-based with co-location / cloud servers (no owned data center)7.1–7.9 for office environment. 7.10, 7.13, 7.14 for end-user devices. Physical security of the co-lo facility addressed through supplier security (5.22, 5.23) rather than Domain 7 controls.7.11–7.12 typically excluded or addressed through supplier security for the co-lo facility.The most common scenario for Indonesian technology companies. The co-location provider's ISO 27001 or SOC 2 report can be used as evidence of physical security at the data center level, supplemented by the organization's own office physical controls.
Financial institution with regulated data center requirementsAll 14 controls, with enhanced implementation standards for 7.1–7.5 driven by POJK IT governance requirements and BI payment system physical security standards.NonePOJK 11/2022 and BI payment system regulations specify physical security requirements that exceed ISO 27001 minimums. Indonesian financial institutions should implement to the higher regulatory standard and treat ISO 27001 as a compliance framework within that context.
Justifying physical control exclusions in the SoA: For cloud-native organizations excluding controls 7.1–7.6, the exclusion justification must be specific and complete. Generic justifications like 'not applicable — we use cloud' are not sufficient. The required justification format: 'Not applicable — [organization] has no owned or leased physical premises containing information processing facilities. All information processing occurs within facilities operated by [cloud provider name], whose physical security is governed by [the provider's ISO 27001 certification / SOC 2 Type II report]. Physical security obligations for these facilities are addressed through supplier security controls (5.22, 5.23) rather than direct implementation of Domain 7 controls.' This level of specificity satisfies auditors and regulators.

Physical Security in Indonesian Context

Environmental threats specific to Indonesia

Control 7.5 requires organizations to assess and mitigate physical and environmental threats relevant to their location. Indonesian organizations face a distinct set of environmental risks that must be explicitly addressed:

  • Flooding: Jakarta's regular flooding risk — particularly for ground-floor server rooms and basement infrastructure — requires elevation above floor level, water detection sensors, and emergency response procedures. Many Jakarta data breaches have resulted from flood damage to inadequately protected infrastructure rather than cyber attack.
  • Earthquake risk: Organizations in high-seismic zones (parts of Java, Sumatra, Sulawesi) should assess equipment anchoring, rack stability, and recovery procedures in earthquake scenarios.
  • Power instability: Indonesia's power grid reliability varies significantly by region. Surabaya, Medan, and outer island organizations face higher power instability risk than Jakarta. UPS sizing must account for typical outage duration in the specific location, not generic standards.
  • Humidity and heat: Indonesian climate creates specific HVAC requirements for server rooms. Server room temperature and humidity monitoring with automated alerts is essential — overheating and corrosion from humidity are genuine equipment failure risks in the Indonesian climate.

Physical disposal and e-waste regulations

Control 7.14 (secure disposal) intersects with Indonesian e-waste regulations. Equipment disposal must comply with Government Regulation No. 101/2014 on Hazardous and Toxic Waste Management for electronic equipment. The practical implication for ISMS implementation: disposal vendors for IT equipment must be authorized for e-waste handling under Indonesian regulation — not just capable of data destruction. Retain both the secure destruction certificate (evidence for 7.14 and UU PDP) and the e-waste disposal certificate (evidence for environmental compliance).

POJK IT facility standards

For Indonesian financial institutions, POJK 11/2022 specifies physical security requirements for IT facilities that set a higher standard than ISO 27001's principle-based requirements. Key POJK-specific physical requirements include: dedicated secure rooms for core banking infrastructure, access control with logging requirements for IT facilities, environmental monitoring with defined response procedures, and physical security requirements for branch IT equipment. ISO 27001 Domain 7 implementation in a POJK-regulated environment should be calibrated to the POJK standard — ISO 27001 certification demonstrates the management system, while POJK compliance ensures the technical specifics are met.

Common Domain 7 Gaps

Secure disposal without evidence

The most common and consequential Domain 7 gap: devices are disposed of — sometimes appropriately — but no disposal records are retained. Three to five years after disposal, an auditor asks for evidence that the laptops decommissioned in 2022 were securely wiped. No records exist. The evidence of secure disposal is the certificate — either from the in-house secure wipe procedure (recording the device serial number, wipe method, operator, and date) or from the third-party destruction vendor. Without this record, the control cannot be verified regardless of what was actually done. Start retaining disposal records immediately and retroactively for any equipment still within the documentation retention period.

Physical access not reviewed quarterly

The quarterly access review that ISMS teams apply to digital systems is rarely applied to physical access control systems. The result: former employees who left 12 months ago still have active physical access cards. Long-departed contractors whose card was 'returned' but not deactivated in the access system. Accounts in the access control software that no longer correspond to anyone in the organization. Physical access review must be synchronized with the digital access review cycle — the same process, applied to both access control systems.

Cloud-native organizations over-scoping Domain 7

The reverse problem also occurs: cloud-native organizations that include all 14 Domain 7 controls in their SoA as 'applicable' because they have office space, without assessing which controls genuinely apply to their physical footprint. A 20-person software company in a co-working space with no owned server infrastructure does not have the same physical security profile as a 500-person financial institution. Over-including controls without genuine implementation creates SoA entries that auditors will probe — and cannot be evidenced. Scope Domain 7 honestly against the actual physical environment, justify exclusions specifically, and implement the applicable controls well.

Pre-Audit Physical Security Checklist

Use this checklist in the 6 weeks before a Stage 2 or surveillance audit to verify that physical security evidence is current, accessible, and complete:

Perimeters and entry (7.1–7.2)

☐  Physical perimeter diagram documented and current

☐  All secure area boundaries physically sound — no gaps via false ceilings, shared walls, or service corridors

☐  Access control readers installed at server room and other secure area entrances

☐  Access control logs available — minimum 90 days of entry records retained

☐  Unauthorized persons cannot access secure areas without escort

☐  Physical access rights reviewed quarterly — same cadence as digital access review

☐  Former employees' physical access cards deactivated within 4 hours of departure

Monitoring and environment (7.4 ★, 7.5)

☐  CCTV or equivalent monitoring deployed at all secure area entrances

☐  CCTV recording retention meets defined policy (minimum 30 days)

☐  Physical security monitoring response procedure defined and assigned

☐  Environmental threat assessment documented for this location

☐  Flooding risk addressed (elevated server room or water detection sensors) — relevant for Jakarta

☐  Fire suppression installed and tested in server room

☐  Temperature and humidity monitoring active in server room with alerts configured

Equipment and media (7.8–7.10)

☐  Server racks not visible from public areas or through windows

☐  Network equipment in locked cabinets

☐  Laptop encryption enabled for all devices used off-premises

☐  Off-premises device loss/theft reporting procedure defined (1-hour target)

☐  Removable media register maintained — all USB drives, external drives documented

☐  Removable media containing sensitive/personal data encrypted

Infrastructure (7.11–7.12)

☐  UPS deployed for critical systems — capacity verified against actual load

☐  Generator present for extended outages — last test within 12 months

☐  Redundant ISP connection (or documented risk acceptance if single ISP)

☐  Cabling diagram current — all server room connections documented

☐  Cables labelled — what connects to what is verifiable without 'tribal knowledge'

☐  Power and data cables separated in runs to minimize interference

Maintenance and disposal (7.13–7.14)

☐  Equipment maintenance schedule documented per asset type

☐  Maintenance records retained (service reports, invoices)

☐  Data removed from devices before external maintenance

☐  Secure disposal procedure documented with NIST SP 800-88 or equivalent method

☐  Asset disposal register maintained — every disposed device recorded with disposal method

☐  Secure destruction certificates obtained and retained for all media containing personal or confidential data

☐  SSD disposal uses secure erase command or physical destruction — not format-only

Bitlion physical controls tracking: Bitlion's GRC platform tracks physical security controls within the same ISMS evidence framework as technical and governance controls. Physical access review records, equipment maintenance schedules, disposal certificates, and environmental monitoring test records are uploaded against their corresponding Annex A control and clause references. The evidence currency dashboard flags physical security controls where evidence has lapsed beyond the defined review period — preventing the common situation where physical controls are implemented but evidence is not maintained between audits.