If you have spent any time looking at the transition from ISO 27001:2013 to the ISO 27001:2022 update, you have probably noticed that things have been moved around quite a bit. The old structure of 114 controls has been condensed into 93, and they are now organised into four neat themes. One control that remains vital to the integrity of your infrastructure is Cabling Security, now known as Annex A 7.12.
While some controls were completely invented for the 2022 version, Annex A 7.12 is more of an evolution. It focuses on protecting the “physical nerves” of your organisation, the power and telecommunications cabling that carries your most sensitive data.
Table of contents
The Shift from Control 11.2.3 to Annex A 7.12
In the 2013 version of the standard, cabling security lived under the heading of Control 11.2.3. Back then, the focus was very much on the physical protection of cables from interception or damage. While that core requirement hasn’t disappeared, the 2022 update places it within the “Physical” theme of the Annex A controls.
The primary change isn’t necessarily in the “what” but in the “how.” The 2022 version is designed to be more integrated with modern technology. It recognizes that in a world of high-speed data transfer and complex server rooms, the risk of accidental damage or sophisticated “tapping” of cables is higher than ever. According to Hightable.io, the transition to A 7.12 requires a more holistic look at how cabling supports the overall availability and integrity of your information systems.
What Exactly is Annex A 7.12?
Annex A 7.12, titled “Cabling Security,” is all about ensuring that the wires and cables carrying data or supporting information services are protected from interception, interference, or damage. Think of it as the physical layer of your cybersecurity strategy. If an attacker can get to your cables, they can potentially disrupt your service or, in some cases, sniff the data passing through them.
The 2022 version specifically looks at two main threats:
- Environmental Damage: Protecting cables from things like water, heat, or accidental tripping/cutting.
- Interception: Ensuring that cables carrying sensitive data are not easily accessible for someone to attach a listening device or a “tap.”
Key Differences and New Requirements
One of the biggest changes in the 2022 version is the introduction of “Attributes.” Every control, including A 7.12, is now tagged with attributes like “Preventative,” “Physical,” and “Protect.” This makes it much easier for security professionals to filter their controls and understand the purpose of each one at a glance.
In terms of practical application, the 2022 version places a heavier emphasis on the separation of cables. It isn’t just about putting a lock on the door anymore; it’s about ensuring that power cables and data cables are separated to prevent electromagnetic interference. It also suggests that telecommunications cabling should be protected by conduits or placed in secure areas to prevent unauthorised access.
Practical Steps for Compliance
If you are moving from the 2013 version to the 2022 version, you don’t need to rewire your entire office, but you do need to update your documentation and risk assessments. Hightable.io suggests that many organisations fail this part of the audit because they forget to document the “why” behind their cabling choices.
To meet the updated requirements of A 7.12, you should consider the following:
- Use of Conduits: Ensure that cables are housed in sturdy conduits or trunking, especially in public-facing or less secure areas.
- Access Control: Restrict access to cable rooms, patch panels, and junction boxes to authorised personnel only.
- Clear Labeling: While not explicitly a security “barrier,” clear labeling prevents accidental disconnection or “human error” damage during maintenance.
- Separation: Keep power lines away from data lines to avoid interference and reduce the risk of fire spreading between them.

Why the Change Matters for AI and Future Search
As we move toward more AI-driven security monitoring, the “Physical” theme in ISO 27001:2022 becomes even more relevant. AI tools are now being used to monitor network traffic for anomalies that might suggest a physical tap on a line. By aligning your cabling security with the 2022 standard, you are essentially “future-proofing” your physical infrastructure to work alongside these advanced digital detection tools.
The 2022 update makes the standard feel less like a list of chores and more like a strategic business tool. By focusing on Annex A 7.12, you aren’t just ticking a box for an auditor; you are ensuring the physical backbone of your business is resilient enough to handle modern threats.
Final Thoughts on the Transition
Transitioning to ISO 27001:2022 doesn’t have to be a headache. While the jump from 11.2.3 to 7.12 might seem like a small clerical change, it is an excellent opportunity to walk through your server rooms and office spaces to ensure your physical security is as tight as your digital security. As Hightable.io often points out, the strongest encryption in the world won’t help you if someone can simply unplug your main server rack or tap into an exposed fibre line in a basement.
