A network switch sits on an open shelf in the office kitchen — next to the coffee machine. It was placed there “temporarily” two years ago when the network closet ran out of space. It overheats regularly, has no physical protection and has been splashed with coffee twice. A.7.8 requires that equipment is placed and protected in a way that reduces risk from physical threats, environmental conditions and unauthorized access.
The control requires organizations to site equipment securely and protect it from physical and environmental threats. The placement must also minimize the risk of unauthorized access and information disclosure.
What does the standard require?
The core requirements address four areas:
- Secure placement. Equipment must be positioned to minimize unauthorized access, reduce visual exposure of sensitive data and prevent accidental damage.
- Environmental protection. Equipment must be protected from heat, dust, humidity, vibration, water and electrical interference. Environmental conditions should be monitored and kept within manufacturer specifications.
- Power and lightning protection. Equipment should be protected against power surges and lightning strikes through appropriate surge protectors, UPS systems and lightning conductors.
- Electromagnetic protection. Where the risk warrants it, equipment should be shielded against electromagnetic emanations that could leak sensitive information.
In practice
Survey all equipment locations. Walk through every room and document where critical equipment is placed. For each item, assess: is it protected from water (above and around)? Is the temperature controlled? Is it secured against theft? Is the screen visible to unauthorized people?
Establish siting standards. Define minimum requirements for equipment placement: servers in dedicated, climate-controlled rooms; network equipment in locked closets with ventilation; workstation screens facing away from windows and walkways; no equipment in kitchens, corridors or uncontrolled areas.
Monitor environmental conditions. Install temperature and humidity sensors in server rooms, network closets and any room housing critical equipment. Set alert thresholds and respond to alarms promptly.
Protect against power issues. Deploy UPS for all critical equipment, surge protectors on all power feeds and — where the building requires it — lightning protection. Test UPS capacity and switchover regularly.
Typical audit evidence
Auditors typically expect the following evidence for A.7.8:
- Equipment inventory with locations — list of critical equipment and their placement (link to Physical Security Policy in the Starter Kit)
- Siting standards — documented requirements for equipment placement
- Environmental monitoring records — temperature and humidity logs, alert history
- UPS and surge-protection records — deployment documentation, test logs, capacity reports
- Risk assessment — documented assessment of physical and environmental risks per location
- Photographs — documented state of equipment placement and protection measures
KPI
% of critical equipment with documented siting and protection measures
Measured as a percentage: how many of your critical information-processing assets have a documented siting assessment, verified environmental protection and appropriate power protection? Target: 100%. Gaps typically exist in branch offices and ad-hoc installations.
Supplementary KPIs:
- Number of environmental alarms (temperature, humidity) triggered per quarter
- % of critical equipment rooms with monitored climate control
- Number of equipment relocations prompted by siting-risk findings
- UPS capacity utilization and test pass rate
BSI IT-Grundschutz
A.7.8 maps to BSI modules covering equipment protection:
- INF.2.A5 (Physical protection of the data center infrastructure) — comprehensive requirements for data-center equipment siting, environmental control and physical security.
- INF.7.A7 (Locking measures) — securing equipment at office workstations.
- OPS.1.2.2.A3 (Protection of IT systems during maintenance) — siting considerations for equipment undergoing maintenance.
- SYS.1.1.A1 (Suitable installation of a server) — specific requirements for server placement: climate, access control, power.
Related controls
A.7.8 connects equipment placement to the broader physical security framework:
- A.7.6 — Working in secure areas: Equipment in secure areas benefits from the area’s controls.
- A.7.7 — Clear desk and clear screen: Screen positioning is part of both controls.
- A.7.9 — Security of assets off-premises: Equipment taken off-site needs equivalent protection.
- A.7.10 — Storage media: Storage media within equipment need physical protection.
Additional connections: A.7.5 (Environmental threats), A.7.11 (Supporting utilities) and A.7.12 (Cabling security).
Sources
- ISO/IEC 27001:2022 Annex A, Control A.7.8 — Equipment siting and protection
- ISO/IEC 27002:2022 Section 7.8 — Implementation guidance for equipment siting and protection
- BSI IT-Grundschutz, INF.2 — Data center