Skip to content
arrow_back
search
Annex A 8.22 verified ISO/IEC 27001:2022

Network Segregation for Security

Separate network groups to limit risks and control access between services, users, and systems.

record_voice_over

Plain language

Network segregation for security means dividing up a company's network into smaller, isolated parts to keep different activities and data separate. This is important because it limits what can go wrong if one part of the network is breached, ensuring that problems like cyber attacks don't spread throughout the entire organisation.

Framework

ISO/IEC 27001:2022

Control effect

Preventative

ISO 27001 domain

Technological controls

Classifications

N/A

Official last update

24 Oct 2022

Control Stack last updated

19 Mar 2026

Maturity levels

N/A

Official control statement

Groups of information services, users and information systems shall be segregated in the organization’s networks.
verified ISO/IEC 27001:2022 Annex A 8.22
priority_high

Why it matters

Without network segregation, attackers can move laterally between services and systems, escalating access and exposing sensitive data.

settings

Operational notes

Review segmentation rules as services change; validate firewalls/ACLs restrict traffic between segments to only approved flows.

Mapping detail

Mapping

Direction

Controls