SUCCESS
  • Home
  • About
  • Controls
    • Governance
    • Access Control
    • Asset Management
    • Data Security
    • Human Resources
    • Software Security
    • Incident Response
    • Vulnerability Management
    • Risk Management
    • Physical Security
    • Team
  • Other Resources
  • More
    • Home
    • About
    • Controls
      • Governance
      • Access Control
      • Asset Management
      • Data Security
      • Human Resources
      • Software Security
      • Incident Response
      • Vulnerability Management
      • Risk Management
      • Physical Security
      • Team
    • Other Resources
SUCCESS
  • Home
  • About
  • Controls
    • Governance
    • Access Control
    • Asset Management
    • Data Security
    • Human Resources
    • Software Security
    • Incident Response
    • Vulnerability Management
    • Risk Management
    • Physical Security
    • Team
  • Other Resources

19 - Security measures to restrict physical access to sensitive areas should be implemented

Purpose:

Protect data that isn’t virtual/access to sensitive systems


Best Practices:

Develop and frequently update a set of physical security policies 


Examples:

Locking file cabinets with sensitive data, putting keycard scanners at the entrances to sensitive areas

20 - Comprehensive physical security policies should be developed to guide personnel and equipment protection

Purpose:

Develop a record of how to adhere to physical security guidelines and educate employees


Best Practices:

Train employees on physical security policies as they are modified


Examples:

Designating storage/use policy for employee key cards, secure storage policies for keys


Copyright © 2023 SUCCESS - All Rights Reserved.

Powered by GoDaddy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept