A sales representative leaves their laptop in a rental car overnight. The car is broken into, the laptop is stolen. It was not encrypted. The device contained a complete customer database, pricing sheets, three months of email and saved VPN credentials. The data breach affects 12,000 customer records. A.7.9 requires that off-premises assets are protected to the same standard as on-site equipment — and that the most likely loss scenario (theft) is mitigated by encryption.
The control requires organizations to prevent loss, damage, theft or compromise of devices and information that are used outside the organization’s premises.
What does the standard require?
The core requirements address five areas:
- Management authorization. Taking organizational assets off-premises must be authorized. This includes company-owned devices and personal devices used for work (BYOD).
- Physical protection. Devices must be physically protected when off-site: never left unattended in public places, kept in secure locations (hotel safe, locked car trunk — briefly) and protected from environmental hazards.
- Encryption and data minimization. Off-premises devices must use full-disk encryption. Sensitive data that is not needed for the off-site activity should be removed or not synchronized to the device.
- Remote-wipe and tracking. Where feasible, enable remote-wipe capability and location tracking to respond to loss or theft.
- Chain of custody. When devices are transferred between people (e.g. loaner laptops, equipment sent for repair), maintain a documented chain of custody.
In practice
Enforce encryption on all portable devices. Use BitLocker (Windows), FileVault (macOS) or equivalent. Verify encryption status through your MDM or endpoint-management platform. Block non-encrypted devices from accessing organizational resources.
Issue an off-premises usage policy. Cover: authorization requirements, physical-security expectations (never leave devices unattended, use hotel safes, avoid displaying sensitive data in public), rules for public Wi-Fi (mandatory VPN), reporting obligations for loss or theft and consequences for non-compliance.
Enable remote wipe. Configure all mobile devices and laptops for remote wipe through your MDM solution. Test the capability periodically. Define the trigger criteria: when is a remote wipe initiated?
Minimize data on portable devices. Where possible, use thin-client or virtual-desktop approaches so that data stays in the data center. If data must be local, synchronize only what is needed for the current assignment.
Handle device transfers formally. When a device changes hands — new user, repair, disposal — document the transfer: who, when, what state (encrypted, wiped, intact). This chain-of-custody log is essential for accountability.
Typical audit evidence
Auditors typically expect the following evidence for A.7.9:
- Off-premises usage policy — the approved policy document (link to Physical Security Policy in the Starter Kit)
- Encryption compliance report — MDM/endpoint report showing encryption status of all portable devices
- Remote-wipe configuration — evidence that remote-wipe is enabled and tested
- Asset register — inventory of portable devices with assigned users and off-premises authorization
- Chain-of-custody logs — records of device transfers
- Incident reports — documentation of lost/stolen device cases and response actions
KPI
% of off-premises assets with applied security controls and tracking
Measured as a percentage: how many of your portable devices used off-premises have (1) full-disk encryption, (2) remote-wipe capability and (3) an assigned owner in the asset register? Target: 100%. Common starting points are 70–85%, with gaps typically in BYOD devices and legacy hardware.
Supplementary KPIs:
- Number of lost/stolen devices reported per quarter
- Average time from loss report to remote-wipe execution
- % of portable devices with verified encryption
- Number of off-premises policy violations reported
BSI IT-Grundschutz
A.7.9 maps to BSI modules covering mobile and off-site usage:
- OPS.1.2.4 (Telecommuting) — security requirements for devices used in remote-working scenarios.
- INF.8 (Home workplace) — physical security for devices at a home office.
- INF.9 (Mobile workplace) — security for devices used at ad-hoc locations.
- CON.7 (Information security on business trips) — specific guidance for devices during travel: border-crossing risks, hotel security, public-transport precautions.
- SYS.3.1 (Laptops) — technical security requirements for laptops: encryption, access control, secure configuration.
Related controls
A.7.9 extends on-premises security to the mobile world:
- A.7.7 — Clear desk and clear screen: Clear-screen rules apply off-premises too — lock the screen in cafes, trains and airports.
- A.7.8 — Equipment siting and protection: On-premises siting; A.7.9 covers off-premises.
- A.7.10 — Storage media: Removable media taken off-site need the same protection.
- A.7.11 — Supporting utilities: Off-premises, you cannot rely on organizational power and network infrastructure.
Additional connections: A.6.7 (Remote working), A.8.1 (User endpoint devices) and A.5.14 (Information transfer).
Sources
- ISO/IEC 27001:2022 Annex A, Control A.7.9 — Security of assets off-premises
- ISO/IEC 27002:2022 Section 7.9 — Implementation guidance for security of assets off-premises
- BSI IT-Grundschutz, CON.7 — Information security on business trips