DS12.3:

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search

DS 12.3 Physical Access

Control Objective:
Define and implement procedures to grant, limit and revoke access to premises, buildings and areas according to business needs, including emergencies. Access to premises, buildings and areas should be justified, authorized, logged and monitored. This applies to all persons entering the premises, including staff, temporary staff, clients, vendors, visitors or any other third party.

Applicability:

Sarbanes-Oxley
HIPAA
GLBA
PCI
FISMA
NIST SP 800-66
Ditscap
Control Exception
User Defined


Risk Association Control Activities:

1. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.
a. SOX.1.5 A designated individual is responsible for regular monitoring and reporting on the achievement of the third-party service-level performance criteria.


2. Risk: Computer equipment may be compromised by accidental damage.
a. SOX.2.6.1 Physical storage of computer equipment should be appropriately protected to prevent the risk of accidental damage (e.g., fire, flood, smoke, water, dust, vibration, chemicals, and radiation).


3. Risk: Third party processors create unacceptable control risks to the Company.
a. SOX.2.0.5 Selection of Vendors for outsourced services is performed in accordance with the organization's vendor management policy.


  • PCI-9.1.1 Use cameras to monitor sensitive areas. Audit this data and correlate with other entries. Store for at least three months, unless otherwise restricted by law.


  • PCI-9.1.2 Restrict physical access to publicly accessible network jacks.


  • PCI-9.1.3 Restrict physical access to wireless access points, gateways, and handheld devices.


  • PCI.9.2: Develop procedures to help all personnel easily distinguish between employees and visitors, especially in areas where cardholder information is accessible.


  • PCI-9.3.1 Authorized before entering areas where cardholder data is processed or maintained.


  • PCI-9.3.2 Given a physical token (e.g., badge or access device) that expires, and that identifies them as non-employees.


  • PCI-9.3.3 Asked to surrender the physical token before leaving the facility or at the date of expiration.PCI.9.4: Use a visitor log to retain a physical audit trail of visitor activity. Retain this log for a minimum of three months, unless otherwise restricted by law.

  • PCI.9.6: Physically secure all paper and electronic media (e.g., computers, electronic media, networking and communications hardware, telecommunication lines, paper receipts, paper reports, and faxes) that contain cardholder information.


  • PCI-9.7.1 Label the media so it can be identified as confidential.


  • PCI-9.7.2 Send the media via secured courier or a delivery mechanism that can be accurately tracked.


Process Narrative
Insert a description of the process narration that is applicable to the existing control statement this narrative refers to.

Process Illustration
The following illustration represents the process flow for administering access to a physical resource. Examples of this would include the corporate data center. The physical location that surrounds critical data stores and the physical locations where electronic or local console access mechanisms exist providing a conduit to these critical data stores.



Control Commentary
Insert a description of the control that is applicable to the existing control statement this commentary refers to.

Control Exception Commentary
Insert a description of the control exception that is applicable to the existing control statement this commentary refers to.

Evidence Archive Location
Insert Evidence Description Here.

Control Status and Auditors Commentary
Describe the condition of the applicable control and its effectiveness. Set the color icon to a redlock.jpg, yellowlock.jpg or greenlock.jpg.

File:Redlock.jpg

Remediation Plan
Insert remediation plan, applicability, or any information that indicates what needs to be done.

Supplemental Information:
ISO 7.1 Secure areas
ISO 7.2 Equipment security
ISO 7.3 General controls
ISO 8.5 Network management
ISO 8.6 Media handling and security
ISO 4.1 Information security infrastructure
ISO 4.2 Security of third-party access
ISO 6.1 Security in job definition and resourcing
ISO 8.1 Operational procedures and responsibilities
ISO 9.3 User responsibilities