Purpose:
Protect data that isn’t virtual/access to sensitive systems
Best Practices:
Develop and frequently update a set of physical security policies
Examples:
Locking file cabinets with sensitive data, putting keycard scanners at the entrances to sensitive areas
Purpose:
Develop a record of how to adhere to physical security guidelines and educate employees
Best Practices:
Train employees on physical security policies as they are modified
Examples:
Designating storage/use policy for employee key cards, secure storage policies for keys
Copyright © 2023 SUCCESS - All Rights Reserved.
Powered by GoDaddy
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.