answersLogoWhite

0

From NIST 800.53 rev 4:

Physical and Environmental Protection Policy and Procedures

Physical Access Authorizations

Physical Access Control

Access Control for Transmission Medium

Access Control for Output Devices

Monitoring Physical Access

Visitor Access Records

Power Equipment and Cabling

Emergency Shutoff

Emergency Power

Emergency Lighting

Fire Protection

Temperature and Humidity Controls

Water Damage Protection

Delivery and Removal

Alternate Work Site

Location of Information System components

Information Leakage

Asset Monitoring and Tracking.

==========

Physical access control to spaces where computer assets (computers, networking connections, cabling, etc.) are present.

Physical protection of documented information about instituted protections.

Environmental protections of computers and users to protect availability and integrity (for example, EM interference can compromise integrity of transmitted information)

Physical protections against eavesdropping, interception, alteration, and interference

Tamper evident seals

Protection from physical threats (for example: protecting data center from fires, floods, tornadoes, etc.)

Protection of storage media (tapes, disks, drives, etc) - access control, theft prevention, protection against damage

User Avatar

Wiki User

8y ago

What else can I help you with?

Related Questions

Physical security standards include both physical protective measures and?

procedural


Physical security standards include both protective measures and?

procedural


What are the three part of physical security standards for various types of army equipment?

The three parts of physical security standards for various types of army equipment typically include access control, which governs who can physically access the equipment; physical barriers, such as fences and locks, that deter unauthorized access; and surveillance measures, including cameras and security personnel, to monitor and respond to potential threats. These standards aim to protect sensitive military assets from theft, sabotage, or damage. Additionally, regular assessments and updates to security protocols are essential to adapt to evolving risks.


What regulation address risk analysis and physical security standards?

Ar 190-51


What are the three parts to physical security standards for various types of Army equipment?

The three parts to physical security standards for various types of Army equipment include access control, which restricts unauthorized personnel from accessing sensitive areas; surveillance, which involves monitoring and documenting activities around equipment to deter and detect potential threats; and physical barriers, such as fences or locks, that protect equipment from theft or sabotage. Collectively, these measures ensure the safety and integrity of military assets.


Where can one read the official PCI Data Security Standards?

The official PCI Data Security Standards can be accessed through the PCI Security Standards Council website. These standards are set up in order maintain standards for data security through payment cards. These standards help to prevent and detect security incidents.


Where can you find construction standards for secure rooms at cleared contractor facilities by reviewing?

You can find construction standards for secure rooms at cleared contractor facilities by reviewing the National Industrial Security Program Operating Manual (NISPOM), particularly the sections that outline the requirements for physical security and facility construction. Additionally, the Defense Security Service (DSS) provides guidelines and resources regarding secure facility construction standards. Reviewing documents from the Committee on National Security Systems (CNSS) can also offer relevant security standards.


What does level 3 security involve?

Level 3 security typically involves a comprehensive approach to safeguarding sensitive information and assets. This may include advanced physical security measures, such as controlled access points and surveillance, as well as stringent cybersecurity protocols like encryption and multi-factor authentication. Additionally, regular audits and assessments are conducted to identify vulnerabilities and ensure compliance with security standards. Overall, Level 3 security aims to provide a robust defense against both physical and digital threats.


Which is a physical security measure?

Physical security measures are things that are done to reduce data theft through physical means. This does not mean, for example, installing a physical firewall (this is logical security, the prevention of data theft over the wire). Physical security means to physically secure the hardware. This may include cages, locked doors and security badges, and even padlocks on workstations to limit the ability to open the cases or remove the case from its physical location.


Where can one find information on PCI Security Standards?

PCI Data Security Standards are important when someone is conducting business online. To find more information on security standards you can look to the McAfee website or go directly to the PCI Security Standards Council website.


Does Quad Graphics use security services?

Yes, Quad Graphics employs various security services to protect its operations and sensitive information. These services typically include cybersecurity measures, physical security protocols, and risk management strategies to safeguard against potential threats. The company prioritizes the protection of its assets, ensuring compliance with industry standards and regulations.


What are the 3 parts to physical security standards for various types of army equipment and the risk level calculated for each piece of equipment?

The three parts of physical security standards for army equipment typically include access control, surveillance, and environmental protection. Access control restricts who can physically access the equipment, while surveillance involves monitoring areas for unauthorized activity. Environmental protection addresses safeguarding equipment from physical threats such as theft, vandalism, or natural disasters. The risk level for each piece of equipment is calculated based on its value, vulnerability to threats, and the potential impact of its loss or damage.