ISO 27001 with Offline Secure Storage
ISO 27001 requires a systematic approach to information security. Offline Secure Storage (OSS) maps directly to Annex A physical and environmental controls.
We Think This Is Hard to Ignore
M&S had ISO 27001 certification when DragonForce ransomware bypassed their certified controls via a third-party compromise. At Firevault, classified information assets live on hardware with no network connection, because Annex A.11 physical security means nothing if the data is always online.
£14M
ICO fine to Capita — ISO 27001 certified at time of breach
ICO, October 2025
6M+
People affected despite Capita holding ISO 27001
ICO, October 2025
277 days
Average time to identify and contain a breach
IBM Cost of a Data Breach 2024
£4.5M
Average cost of a data breach globally
IBM Cost of a Data Breach 2024
ISO 27001 requires physical security controls.
Annex A.11 Physical Security
Physical security perimeters and environmental controls are mandatory, not optional.
Asset Management
Critical information assets must be identified, classified, and appropriately protected.
Access Control
Logical and physical access controls must be proportional to asset sensitivity.
Certification alone does not prevent breaches.
Capita: £14M Fine Despite Holding ISO 27001 Certification
Capita held ISO 27001 certification at the time of its breach. The ICO still fined the company £14 million, demonstrating that certification without physical protection is insufficient.
ICO, October 2025
LastPass: £1.2M Fine Despite Security Company Status
LastPass, a company whose entire business is security, was fined £1.2 million by the ICO for failures that allowed hackers to steal personal data of 1.6 million UK customers.
ICO, December 2025
M&S: Third-Party Compromise Bypassed Certified Controls
Attackers bypassed M&S security controls by compromising a third-party provider, demonstrating that ISO 27001 supply chain controls must extend to physical protection.
Reuters, 2025
Direct mapping to ISO 27001 controls.
Offline Secure Storage (OSS) provides physical infrastructure that directly satisfies multiple Annex A controls.
- Physical security perimeters (A.11.1) — purpose-built secure facilities
- Equipment security (A.11.2) — tamper-evident, monitored environments
- Access control (A.9) — authenticated, audited access sessions
- Operations security (A.12) — controlled processing environments
Take Classified Assets Off Standard Infrastructure
Step 1 of 3Classified information assets are taken off standard infrastructure and written to physically disconnected RAID 1 drives inside a Firevault Bunker. This directly satisfies Annex A.11 physical security perimeter controls.
Choose Your Protection
Which OSS Fits?
300GB
Low Use Vault — Deep Cold Storage
From £74.99/mo
inc. VAT · £0 due today
Offline Secure Storage for Offline Secure Storage — low use vault — deep cold storage.
What 300GB holds
Specifications
Capacity
300GB
Access
2 windows/week
Authentication
Identity-locked
Commitment
36 months
Security & Compliance
How to Get Started
Step 1
Discovery Call
Understand what you need to protect and how you operate.
Step 2
Vault Configuration
Select your tier, capacity, and access model.
Step 3
Identity Verification
Complete KYC/AML and set up multi-factor authentication.
Step 4
Go Live
Data ingestion, access policy activation, and ongoing support.
Questions
Frequently Asked
Ready to take the next step?
See how Firevault can protect your most sensitive data with physically disconnected storage.