Physical Security Policy Template
Physical Security Policy Template
0
Status: ✘ Working Draft Approved Adopted
Document Owner: Information Security Committee
Last Review Date: August 2020
Audience
The Physical Security Policy applies to all individuals that install, support, maintain, or are
otherwise responsible for the physical security of (Company) Information Resources.
Contents
General
Access Cards
Utility Systems
Housekeeping (if third party)
Loading Docks
Policy
General
Physical security systems must comply with all applicable regulations including but
not limited to building codes and fire prevention codes.
Physical access to all (Company) restricted facilities must be documented and
managed.
All Information Resource facilities must be physically protected in proportion to the
criticality or importance of their function at (Company) .
Access to Information Resources facilities must be granted only to (Company)
support personnel and contractors whose job responsibilities require access to that
facility.
All facility entrances, where unauthorized persons could enter the premises, must be
controlled.
Secure areas must be protected to reduce the risks from environmental threats and
hazards, and opportunities for unauthorized access. This includes:
o information processing facilities handling confidential information should
be positioned carefully to reduce the risk of information being viewed by
unauthorized persons during their use;
o controls should be adopted to minimize the risk of potential physical and
environmental threats;
Access Cards
The process for granting card and/or key access to Information Resource facilities
must include the approval of physical security personnel.
Each individual that is granted access to an Information Resource facility must
sign the appropriate access and non-disclosure agreements.
Cards must not be reallocated to another individual, bypassing the return process.
Physical security personnel must remove the card and/or key access rights of
individuals that change roles within (Company) or are separated from their
relationship with (Company).
Physical security personnel must review card and/or key access rights for the facility
on a periodic basis and remove access for individuals that no longer require access.
Utility Systems
All utility systems in use at the facility must be identified and documented with
detailed procedures for overall maintenance requirements.
Maintenance and testing activities must be performed in accordance to
manufacturers specifications and must be documented to provide an audit trail of
all activities.
Utility systems must be secured from unauthorized access.
Utility systems must be set to alarm on malfunctions.
Emergency systems, lighting, fire suppression, and emergency power systems,
must be in place and tested regularly to ensure functionality.
Critical utilities must be configured in a redundant manner to ensure continued
functionality.
Loading Docks
Procedures for delivery and receipt of packages must be documented.
Delivery areas must be secured and isolated from public areas.
External doors of the delivery area must be secured when internal doors are
open.
Delivery areas must be locked when unattended. Unauthorized personnel must be
accompanied at all times within delivery areas.
Surveillance cameras must be secured and adequately cover delivery areas.
Incoming deliveries must be registered, isolated, and inspected for evidence of
tampering before being moved to internal areas.
All discovered evidence of tampering must immediately be reported to physical
security personnel.
Definitions
See Appendix A: Definitions
References
ISO 27002: 7, 9, 11, 13, 16
NIST CSF: PR.AC, PR.IP, PR.PT, DE.CM
Continuity and Recovery Policy
Incident Management Policy
Waivers
Waivers from certain policy provisions may be sought following the (Company) Waiver
Process.
Enforcement
Personnel found to have violated this policy may be subject to disciplinary action, up to and
including termination of employment, and related civil or criminal penalties.
Any vendor, consultant, or contractor found to have violated this policy may be subject to
sanctions up to and including removal of access rights, termination of contract(s), and
related civil or criminal penalties.
Version History
Versio Modified Approved Approved By Reason/Comments
n Date Date
NEED HELP?
FRSecure is a full-service information security consultancy.
If you need assistance with anything in this resource, please don’t hesitate to reach out to us.
CONTACT US
More resources