Content library
ISO 27001 (2022): Full
7.3: Securing offices, rooms and facilities

Requirement description

To mitigate the risk of unauthorized physical access, damage, and interference to an organization's information and associated assets within offices, rooms, and facilities, it is crucial to design and implement robust physical security measures. This can be done e.g. designing buildings to be discreet, with minimal indicators of their purpose to outsiders and restricting access to directories, internal telephone books, and online maps that identify locations of confidential information processing facilities.

How to fill the requirement

ISO 27001 (2022): Full

7.3: Securing offices, rooms and facilities

Task name
Priority
Status
Theme
Policy
Other requirements
Preventing eavesdropping
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Property security
8
requirements

Examples of other requirements this task affects

F07: Salakuuntelulta suojautuminen
Katakri
11.1.3: Securing offices, rooms and facilities
ISO 27001
6.6.4: Fyysisten tilojen, laitteiden ja tulosteiden turvallisuus
Omavalvontasuunnitelma
FYY-05.1: Turvallisuusalue - Äänieristys
Julkri
7.3: Securing offices, rooms and facilities
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Preventing eavesdropping
1. Task description

Conversations concerning personal data or other confidential information shall not be conveyed to adjacent premises to those who do not have the right to information.

Preventing unauthorized viewing personal data
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Property security
9
requirements

Examples of other requirements this task affects

F06: Salakatselulta suojautuminen
Katakri
11.1.3: Securing offices, rooms and facilities
ISO 27001
6.6.4: Fyysisten tilojen, laitteiden ja tulosteiden turvallisuus
Omavalvontasuunnitelma
FYY-05.2: Turvallisuusalue - Salaa katselun estäminen
Julkri
7.3: Securing offices, rooms and facilities
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Preventing unauthorized viewing personal data
1. Task description

Irrespective of the form in which the information is presented, personal data or other confidential information shall be processed in such a way that the information isn't disclosed for outsiders.

Strong authentication for processing or storage areas of highly confidential information
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Property security
16
requirements

Examples of other requirements this task affects

11.1.1: Physical security perimeter
ISO 27001
11.1.3: Securing offices, rooms and facilities
ISO 27001
PR.AC-2: Physical access control
NIST
DE.CM-2: The physical environment monitoring
NIST
FYY-03: Tiedon käsittely
Julkri
See all related requirements and other information from tasks own page.
Go to >
Strong authentication for processing or storage areas of highly confidential information
1. Task description

Access to areas where confidential information is handled or stored should be restricted to authorized individuals through appropriate access control, e.g. using a two-step authentication mechanism such as an access card and a passcode.

Safe placement of equipment
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Equipment maintenance and safety
19
requirements

Examples of other requirements this task affects

Toiminnan jatkuvuuden hallinta
Katakri
F08: Toiminnan jatkuvuuden varmistaminen
Katakri
11.1.3: Securing offices, rooms and facilities
ISO 27001
11.2.1: Equipment siting and protection
ISO 27001
11.1.4: Protecting against external and environmental threats
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Safe placement of equipment
1. Task description

For example, data processing equipment, as well as other important equipment, should be placed in the premises safely and with consideration. Placement should restrict unauthorized access to devices.

Electromagnetic data breach management
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Equipment maintenance and safety
11
requirements

Examples of other requirements this task affects

I14: Hajasäteily (TEMPEST)
Katakri
11.1.3: Securing offices, rooms and facilities
ISO 27001
11.2.1: Equipment siting and protection
ISO 27001
PR.DS-2: Data-in-transit
NIST
FYY-01.1: Fyysisen turvallisuuden riskien arviointi - TEMPEST - TL III
Julkri
See all related requirements and other information from tasks own page.
Go to >
Electromagnetic data breach management
1. Task description

Electronic devices such as cables, monitors, copiers, tablets and smartphones leak electromagnetic radiation, from which it is possible to find out the original transmitted data with the right hardware and, for example, steal the entered username and password.

Openings in the premises' structures (windows, doors, air conditioning) are protected to prevent radiation from escaping. In addition, equipment handling confidential data is located so as to minimize the risk of leakage due to electromagnetic leakage.

Tasks included in the policy

Task name
Priority
Status
Theme
Policy
Other requirements
No items found.

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.