Skip to main content
← All controls
A.7.4 / PE-6 ISO/IEC 27001:2022 Annex A ISO 27001

A.7.4 — Is physical security monitored continuously (cameras, intrusion detection, alarms)? (NEW in 2022)

Demonstrate that physical security monitoring systems operate continuously across all critical facilities, generate actionable alerts for security events, and maintain auditable records of detected incidents and system health.

Description

What this control does

This control requires organizations to implement continuous monitoring of physical security perimeters and sensitive areas using cameras, intrusion detection systems, motion sensors, and alarm systems. Monitoring systems must operate 24/7, generate alerts for security events, and maintain logs of access attempts, breaches, and environmental anomalies. Continuous monitoring provides real-time detection of unauthorized physical access, vandalism, or environmental threats to facilities housing critical information systems and assets.

Control objective

What auditing this proves

Demonstrate that physical security monitoring systems operate continuously across all critical facilities, generate actionable alerts for security events, and maintain auditable records of detected incidents and system health.

Associated risks

Risks this control addresses

  • Unauthorized individuals gain physical access to server rooms or data centers without detection, enabling theft of equipment or data
  • Insider threats exploit gaps in monitoring coverage to access restricted areas during off-hours without triggering alarms
  • Equipment theft or sabotage occurs in areas with disabled or non-functional monitoring systems
  • Environmental hazards such as water leaks or temperature anomalies go undetected, causing equipment damage or data loss
  • Tailgating or piggybacking incidents remain undetected due to inadequate camera coverage or delayed review of footage
  • Monitoring system failures or gaps in coverage create blind spots exploited by attackers during reconnaissance
  • Delayed incident response due to failed alert mechanisms or lack of real-time monitoring personnel

Testing procedure

How an auditor verifies this control

  1. Obtain and review the physical security monitoring architecture documentation, including camera placements, intrusion detection sensor locations, and alarm system coverage maps for all facilities containing information systems.
  2. Inventory all active monitoring devices (cameras, motion sensors, door contacts, glass break detectors) and verify each device is operational and connected to the central monitoring system.
  3. Review monitoring system configurations to confirm 24/7 recording schedules, retention periods (minimum 90 days recommended), motion detection sensitivity settings, and alert thresholds.
  4. Select a representative sample of critical areas (server rooms, data centers, telecommunications closets, backup media storage) and physically verify camera angles provide unobstructed coverage of all entry points and sensitive equipment.
  5. Examine monitoring system logs for a 30-day period to verify continuous operation, identify any gaps in recording or sensor failures, and confirm automated health-check alerts are functioning.
  6. Review alert escalation procedures and test a sample of recent security alerts (intrusion attempts, door-forced-open events, after-hours access) to verify alerts were generated, routed to appropriate personnel, and documented with response actions.
  7. Interview security operations personnel or contracted monitoring service providers to confirm procedures for real-time alert review, incident response protocols, and periodic testing of alarm systems.
  8. Request evidence of periodic system testing (quarterly minimum) including simulated intrusion events, camera failure scenarios, and backup power failover tests with documented results.
Evidence required Configuration exports from video management systems showing camera schedules, retention settings, and alert rules; physical security monitoring logs spanning 30-90 days with timestamps, event types, and response actions; floor plans annotated with camera coverage zones and sensor locations; maintenance records and system health reports showing uptime metrics; incident response tickets correlating detected events with security team actions; test reports from quarterly alarm system drills and failover exercises.
Pass criteria All critical physical areas containing information systems have continuous monitoring coverage with functional cameras, intrusion detection, or alarm systems that operate 24/7, generate real-time alerts for security events, maintain logs for minimum 90 days, and demonstrate documented incident response to detected events within the past quarter.