Requirement:
Cybersecurity requirements for physical protection of information and technology assets must be defined, documented and approved.
Control Implementation Guidelines:
- Include and document cybersecurity requirements for information and technology assets protection against unauthorized physical access and cyber risks, including, but not limited to:
- Authorized access to critical areas within the organization
- CCTV
- Protection of facility entry/exit and surveillance records
- Secure destruction and re-use of physical assets that hold classified information
- Security of devices and equipment inside and outside the organizations facilities
- Cybersecurity requirements for the protection of information and technology assets in the organization against unauthorized physical access must be supported by the Executive Management. This must be done through the approval of the organization head or his/her deputy
Relevant Cybersecurity Tools:
- Physical Security Policy Template
Expected Deliverables:
- A cybersecurity policy that covers the information and technology asset protection requirements against unauthorized physical access and cyber risks (e.g., electronic copy or official hard copy)
- Formal approval by the head of the organization or his/her deputy on such document (e.g., via the organization's official e-mail, paper or electronic signature)
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you