A delivery driver rings the bell at the loading dock. An employee opens the door and waves the driver through — no badge scan, no ID check, no visitor log entry. The driver walks through the warehouse, past the server room and into the hallway where the finance department sits. Nobody questions why a person in a courier uniform is wandering through the building. A.7.2 requires that every entry into a secure area is controlled, logged and authorized.
The control requires organizations to implement physical entry controls that ensure only authorized personnel gain access to secure areas. Entry must be logged, visitors must be identified and supervised, and delivery areas must be separated from secure zones.
What does the standard require?
The core requirements address four aspects:
- Access control mechanisms. Secure areas must be protected by entry controls — badge readers, locks, biometric scanners or manned reception — appropriate to the security zone.
- Access logging. All entries and exits must be recorded. Logs should capture identity, timestamp and the area accessed.
- Visitor management. Visitors must be identified, registered, issued with a visible badge and supervised. Their access should be limited to the areas necessary for their visit.
- Delivery and loading areas. These must be separated from secure areas. Incoming deliveries should be inspected for tampering before being moved into the building.
- Access-right reviews. Physical access rights must be reviewed regularly and revoked when no longer needed (e.g. after a role change or departure).
In practice
Deploy zone-appropriate controls. Reception area: manned desk or video intercom. General office: badge reader. Restricted zone: badge + PIN. High-security zone: badge + biometric + escort policy. Match the mechanism to the zone classification defined in A.7.1.
Implement a visitor management process. Pre-registration by the host, ID verification at reception, visitor badge issued (visibly different from employee badges), sign-in/sign-out log, escort to and from the meeting room, badge return upon departure.
Separate delivery areas. Deliveries should be received in a loading dock or mailroom that does not provide uncontrolled access to the rest of the building. Inspect incoming packages before distributing them.
Review access rights regularly. At least quarterly, review who has physical access to restricted and high-security zones. Compare badge assignments against the current personnel list and revoke badges for departed employees promptly.
Test the system. Periodically attempt to enter a secure area without authorization (a controlled test) to verify that controls are working and staff challenge unauthorized entry.
Typical audit evidence
Auditors typically expect the following evidence for A.7.2:
- Physical access policy — documented rules per zone (link to Physical Security Policy in the Starter Kit)
- Access control system logs — badge-reader logs showing entries and exits
- Visitor log — register with name, company, host, check-in/check-out times
- Badge assignment register — list of all issued badges with assigned zones and holders
- Access-right review records — evidence of periodic reviews and revocations
- Delivery inspection records — documentation that incoming packages were checked
KPI
% of secure areas with functioning access control systems
Measured as a percentage: how many of your defined secure areas have a working access control system with active logging? Target: 100%. Common gaps include secondary entrances, fire exits used as regular doors and branch offices without badge systems.
Supplementary KPIs:
- % of visitor log entries that are complete (name, company, host, check-in, check-out)
- Average time between employee departure and badge deactivation (target: same day)
- Number of tailgating incidents reported or detected per quarter
- % of access-right reviews completed on schedule
BSI IT-Grundschutz
A.7.2 maps to multiple BSI modules:
- INF.1.A7 (Access regulation and control) — the core requirement for general buildings: badge systems, visitor management, logging.
- INF.1.A12 (Key management) — management of physical keys, including issuance, tracking and revocation.
- INF.1.A13 (Regulations for security areas) — rules for working in and accessing security zones.
- INF.2.A6 (Access control to data centers) — specific access control requirements for data centers, including multi-factor authentication.
- INF.2.A7 (Access logging for data centers) — mandatory access logging with defined retention periods.
- ORP.4.A5 (Assigning physical access authorizations) — requires that physical access rights are formally assigned and documented.
Related controls
A.7.2 builds on the perimeter and connects to monitoring:
- A.7.1 — Physical security perimeters: The perimeter defines the boundary; A.7.2 controls who crosses it.
- A.7.3 — Securing offices, rooms and facilities: Interior security within the perimeter.
- A.7.4 — Physical security monitoring: CCTV and alarms complement the access control system.
Additional connections: A.5.15 (Access control — the organizational policy layer), A.6.1 (Screening — verifying who gets a badge) and A.6.5 (Responsibilities after termination — revoking badges).
Sources
- ISO/IEC 27001:2022 Annex A, Control A.7.2 — Physical entry
- ISO/IEC 27002:2022 Section 7.2 — Implementation guidance for physical entry
- BSI IT-Grundschutz, INF.1 — General building