A.7.1 Physical Security Perimeters
What is this control?
ISO 27001:2022 Annex A 7.1 requires organisations to define and maintain security perimeters to protect areas containing information and information processing facilities. For cloud-native Managed Service Providers, this extends beyond traditional physical walls to include ‘virtual perimeters’ established through Microsoft Entra Named Locations and enforced via Conditional Access policies. The control addresses three security zones: Cloud Facilities (delegated to Microsoft with attestation verification), Core Facilities (on-premises server rooms with physical access controls), and Virtual Perimeter (location-aware access controls creating logical boundaries for remote workforce access).
This control focuses on perimeter DEFINITION; entry authentication is addressed in A.7.2.
How to implement in Microsoft 365
Implementing ISO 27001:2022 A.7.1 involves establishing a three-zone security model. For Cloud Facilities, rely on Microsoft’s SOC 2 Type II and ISO 27001 certifications, reviewing attestations annually via the Service Trust Portal. For Core Facilities, ensure server rooms and network equipment are housed in lockable spaces with access restricted to authorised personnel via keys, cards, or PINs.
For the Virtual Perimeter, define Named Locations in Microsoft Entra representing corporate IP ranges (not just country-based definitions) and configure Conditional Access policies that reference these locations to enforce differentiated access decisions based on trust level. Implement compensatory controls including endpoint encryption (A.8.24) and Global Secure Access (A.8.20) to protect data regardless of physical location. Document perimeter definitions, maintain access registers, and conduct quarterly reviews.
What an auditor looks for
Auditors will verify that Named Locations are defined in Microsoft Entra representing corporate network boundaries with IP-based precision, not just country-level definitions. They will check that Conditional Access policies actively reference these locations in their conditions, enforcing differentiated access decisions based on location trust status. Auditors will review physical security controls for on-premises Secure Zones including lockable server rooms, restricted access registers, and visitor escort procedures.
They will request evidence of annual Microsoft attestation reviews (SOC 2 Type II, ISO 27001) from the Service Trust Portal with management sign-off. Auditors will confirm that equipment is not visible from outside Secure Zones and that perimeter definitions align with the documented ISMS policy. They will verify cross-referenced compensatory controls (A.8.24 encryption, A.8.20 GSA) are operational.
Related controls
- [A.7.2 (Physical Entry)](/controls/a-7-2 (physical entry)/)
- [A.7.3 (Securing offices)](/controls/a-7-3 (securing offices)/)
- [A.7.4 (Physical security monitoring)](/controls/a-7-4 (physical security monitoring)/)
- [A.8.20 (Networks security - GSA)](/controls/a-8-20 (networks security - gsa)/)
- [A.8.24 (Use of cryptography - endpoint encryption)](/controls/a-8-24 (use of cryptography - endpoint encryption)/)
M365 capabilities that implement this control
Microsoft-managed physical access controls for datacentres including monitoring, intrusion detection, and access logging