Page 697 - StudyBook.pdf
P. 697

Operational and Organizational Security: Policies and Disaster Recovery• Chapter 12  681

                         using cables that are locked to the hardware and bolted to the wall or racks
                         in a server room. Similarly, physical access to computers may implement
                         usernames and passwords, password-protected screensavers, smart cards, or
                         other authentication methods that prevent unauthorized use.
                      ■  Validation procedures, which outline how access is given and how the
                         validity of a person’s presence in a restricted area can be verified.
                         Authentication may involve the control measures we previously men-
                         tioned, and other methods that identify and confirm the validity of indi-
                         viduals. It may also specify the roles of specific departments to perform
                         background checks, verify credentials, issue identification cards, and other
                         tasks necessary in confirming a person’s identity and what they are
                         bringing into a facility (i.e., laptops, network analyzers, or other equip-
                         ment that could pose a security risk).
                      ■  Monitoring and record keeping, which manages who is or was in an area
                         at a given time. Such measures may involve electronic surveillance
                         methods like video cameras, or human interaction, such as security guards
                         or receptionists who are responsible for individuals within a certain area.
                         Records may also be used to manage access, such as using sign-in sheets,
                         maintenance records, or other documents that identify a person presence,
                         when they attended the location, and their purpose for being there.

                    A physical security plan addresses numerous components of an organization,
                 including its facilities, personnel, computers, equipment, and other assets.The
                 objectives of the plan focuses on safeguarding these assets from theft, tampering,
                 and other threats that could result from unauthorized physical access.To restrict
                 access and reduce such risks, it is important that the policy be thorough in
                 addressing any areas where security could be an issue.



                 NOTE
                      For more information on issues relating to physical security, refer to
                      Chapter 11, “Operational and Organizational Security: Incident
                      Response.”












                                                                              www.syngress.com
   692   693   694   695   696   697   698   699   700   701   702