Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
ISO 27001

Physical Enforcement of Annex A Controls

ISO 27001 requires organisations to implement appropriate controls from Annex A. Firevault Control provides physical enforcement for network segmentation, access control, and business continuity controls that demonstrate a higher standard of protection.

Back to Control
Control

ISO 27001

ISO 27001 certification demonstrates intent. Physical control enforcement demonstrates reality. The gap between the two is where breaches happen.

14

Annex A controls with physical enforcement

100%

Network segmentation physical evidence

A.8

Technology controls with physical backing

Full

Continuous ISMS evidence generation

The Certification Challenge

Demonstrating control effectiveness is difficult.

Point-in-Time Audits

ISO 27001 surveillance audits capture a snapshot. Between audits, control effectiveness can degrade through configuration drift, human error, or undocumented changes.

Network Control Evidence

Demonstrating continuous network segmentation effectiveness requires evidence that logical controls have been maintained without interruption.

Access Control Gaps

Access reviews happen periodically, but between reviews, excessive access can accumulate as roles change and projects begin and end.

The Scenario

Scenario: Surveillance Audit with Physical Evidence

During an ISO 27001 surveillance audit, the auditor examines network segmentation controls under Annex A.8.22 (Network segmentation). The organisation presents twelve months of continuous physical boundary state logs showing unbroken zone separation. Every conduit activation is documented with multi-party authorisation records, time stamps, and data flow logs. The auditor notes that this level of continuous evidence exceeds what they typically see with software-only implementations, where gaps between configuration audits leave uncertainty about control effectiveness. With Firevault Control, the evidence is irrefutable. Physical boundaries were maintained continuously, and every exception was explicitly authorised and logged.

"Our previous auditor accepted our firewall rules as evidence of network segmentation. Our new auditor asked how we knew the rules had been continuously correct between audits. We could not answer that question with software-only controls."

Framework Mapping

Physical enforcement for ISO 27001 controls.

Organisations strengthen their ISMS with physical control enforcement that provides continuous, irrefutable compliance evidence. Network segmentation is physical. Access control is multi-party authorised. Business continuity is guaranteed through air-gapped archives. Evidence is generated continuously for surveillance audits.

  • Physical enforcement of Annex A technology controls
  • Continuous network segmentation evidence for A.8.22
  • Multi-party access control for A.5.15 and A.5.16
  • Air-gapped business continuity for A.5.30
  • Tamper-proof audit logs for certification evidence
  • Continuous ISMS evidence between surveillance audits
Fracture

Fracture — A.8.22 Network Segmentation

Module 1 of 4

Provides physical enforcement of Annex A.8.22 network segmentation requirements. Zone boundaries are physical, providing irrefutable evidence of continuous segmentation effectiveness.

Featured In

TechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in EssexTechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in Essex

Key Capabilities

Physical Control Enforcement

Annex A controls are enforced physically, providing a higher standard of protection than software-only implementations.

Access Control Evidence

Every access authorisation, session, and revocation is documented in tamper-proof logs for ISMS records.

Continuous ISMS Evidence

Automated logging generates continuous evidence for Statement of Applicability controls, eliminating gaps between surveillance audits.

Segmentation Assurance

Physical network segmentation provides irrefutable evidence of zone separation for A.8.22 compliance.

Audit-Ready Documentation

Tamper-proof logs and automated reports provide complete audit trails ready for certification and surveillance audits.

Recovery Assurance

Air-gapped recovery demonstrates ICT readiness for business continuity beyond what network-connected backups can provide.

Demo to Live

Adoption Guide

Step 1

SoA Mapping Assessment

Map your Statement of Applicability against Control module capabilities to identify where physical enforcement strengthens your ISMS.

Step 2

Control Architecture Design

Design physical enforcement for priority Annex A controls, starting with network segmentation and access control.

Step 3

Pre-Audit Validation

Deploy and validate continuous evidence generation before your next surveillance audit to demonstrate physical control effectiveness.

Step 4

ISMS Integration

Full integration with your ISMS including continuous evidence generation, automated reporting, and air-gapped record preservation.

Step 1

SoA Mapping Assessment

Map your Statement of Applicability against Control module capabilities to identify where physical enforcement strengthens your ISMS.

Step 2

Control Architecture Design

Design physical enforcement for priority Annex A controls, starting with network segmentation and access control.

Step 3

Pre-Audit Validation

Deploy and validate continuous evidence generation before your next surveillance audit to demonstrate physical control effectiveness.

Step 4

ISMS Integration

Full integration with your ISMS including continuous evidence generation, automated reporting, and air-gapped record preservation.

Questions

Frequently Asked

Ready to take the next step?

See how Control can govern your data paths with physical enforcement no software exploit can bypass.

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy