Requirement:
The cybersecurity requirements for physical protection of information and technology assets must be implemented.
Control Implementation Guidelines:
- Implement all cybersecurity requirements for information and technology assets protection against unauthorized physical access, loss, theft, and vandalism. The procedures must cover at least the following, but not limited to:
- Authorized access to critical areas within the organization
- CCTV
- Protection of facility entry/exit and surveillance records
- Secure destruction and re-use of physical assets that hold classified information
- Security of devices and equipment inside and outside the organizations facilities
- Develop an action plan to implement all cybersecurity requirements for the protection of information and technology assets against unauthorized physical access, loss, theft and vandalism
- Include cybersecurity requirements for the protection of information and technology assets against unauthorized physical access, loss, theft, and vandalism in the protection procedures to ensure compliance with cybersecurity requirements for all internal and external stakeholders
Expected Deliverables:
- Documents that confirm the implementation of cybersecurity requirements related to the protection of information and technology assets against unauthorized physical access, loss, theft, and vandalism as documented in the policy
- An action plan to implement cybersecurity requirements for information and technology assets protection against unauthorized physical access, loss, theft, and vandalism
- Evidence that clarifies the implementation of information and technology asset protection controls against unauthorized physical access, loss, theft and vandalism, including, but not limited to:
- An approved user access request form
- Schedule of a visit to CCTV log room to assess the monitoring process and the devices used
- Schedule of a visit to the secure storage room containing archived records
- Sample of the digital media destruction implementation (e.g., email)
- Documented and approved procedures for the security of devices and equipment inside and outside the organizations facilities approved by the representative
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you