Controls for the Physical Security Policy

Controls for the Physical Security Policy - Physical...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Physical Security Policy Student Name: Enter Your Name Here Instructor’s Name: Enter Your Instructor's Name Here Date: Enter the date here
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Physical Security Policy 1. Physical Security Policy 1.1. Security of the building facilities 1.1.1.Physical entry controls Appropriate entry controls to make sure that only the personnel allowed entering a sensitive place can do so. Following controls can be implemented: Token, password, biometric devices or other mechanisms for authentication at the entry points such as keycards or PINs. Tie and date of entry should be recorded for exit and entry. Supplementary mechanisms of automated authentication for highly sensitive information assets, with security personnel on the premises. Video recording of the entry or exit are could also be done. Controlled entry gates and doors with reception desks with staff deputed on them or automated ID and lock mechanisms could be used to control the access to the restricted premises. Doors with bars, windows, perimeter walls, alarms, locks and other physical measures could be used. 1.1.2.Security offices, rooms and facilities Proper entry controls for other offices, facilities and rooms also need to be designed and then implemented which should correspond to the risks identified IT/244 Intro to IT Security Page 1
Background image of page 2
Physical Security Policy and the value of assets and equipment at risk in every setting. These controls could include: Hidden or unobtrusive controls could be used in the facilities where highly sensitive information assets are placed. Authorized persons should be required to wear visible identifications and to report those persons which are not wearing any such identification. Fully visible controls should be used in the security rooms and offices for deterring the crime, as appropriate. Review the access rights via regular reviews or if specifically indicated, these access rights could be revoked as well. This is somewhat related to human resource security. Appropriate monitoring and authorization procedures for the personnel
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 10

Controls for the Physical Security Policy - Physical...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online