0% found this document useful (0 votes)
54 views5 pages

Physical Security Policy Template

Template
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views5 pages

Physical Security Policy Template

Template
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Physical Security Policy , version 1.0.

0
Status: ✘ Working Draft Approved Adopted
Document Owner: Information Security Committee
Last Review Date: August 2020

Physical Security Policy


Purpose
The purpose of the Physical Security Policy is to establish the rules for the granting, control,
monitoring, and removal of physical access to (Company) Information Resource facilities.

Audience
The Physical Security Policy applies to all individuals that install, support, maintain, or are
otherwise responsible for the physical security of (Company) Information Resources.

Contents
General
Access Cards
Utility Systems
Housekeeping (if third party)
Loading Docks

Policy
General
 Physical security systems must comply with all applicable regulations including but
not limited to building codes and fire prevention codes.
 Physical access to all (Company) restricted facilities must be documented and
managed.
 All Information Resource facilities must be physically protected in proportion to the
criticality or importance of their function at (Company) .
 Access to Information Resources facilities must be granted only to (Company)
support personnel and contractors whose job responsibilities require access to that
facility.
 All facility entrances, where unauthorized persons could enter the premises, must be
controlled.
 Secure areas must be protected to reduce the risks from environmental threats and
hazards, and opportunities for unauthorized access. This includes:
o information processing facilities handling confidential information should
be positioned carefully to reduce the risk of information being viewed by
unauthorized persons during their use;
o controls should be adopted to minimize the risk of potential physical and
environmental threats;

(Company) Internal Page 1 of 5


(Company) Physical Security Policy

o environmental conditions, such as temperature and humidity, should be


monitored for conditions which could adversely affect the operation of
information processing facilities.
 Equipment must be protected from power failures and other disruptions caused by
failures in utilities.
 Restricted access rooms and locations must have no signage or evidence of the
importance of the location.
 All Information Resources facilities that allow access to visitors will track visitor
access with a sign in/out log.
 Card access records and visitor logs for Information Resource facilities must be
kept for routine review based upon the criticality of the Information Resources being
protected.
 Visitors in controlled areas of Information Resource facilities must be accompanied
by authorized personnel at all times.
 Personnel responsible for Information Resource physical facility management must
review access records and visitor logs for the facility on a periodic basis and
investigate any unusual access.

Access Cards
 The process for granting card and/or key access to Information Resource facilities
must include the approval of physical security personnel.
 Each individual that is granted access to an Information Resource facility must
sign the appropriate access and non-disclosure agreements.
 Cards must not be reallocated to another individual, bypassing the return process.
 Physical security personnel must remove the card and/or key access rights of
individuals that change roles within (Company) or are separated from their
relationship with (Company).
 Physical security personnel must review card and/or key access rights for the facility
on a periodic basis and remove access for individuals that no longer require access.

Utility Systems
 All utility systems in use at the facility must be identified and documented with
detailed procedures for overall maintenance requirements.
 Maintenance and testing activities must be performed in accordance to
manufacturers specifications and must be documented to provide an audit trail of
all activities.
 Utility systems must be secured from unauthorized access.
 Utility systems must be set to alarm on malfunctions.
 Emergency systems, lighting, fire suppression, and emergency power systems,
must be in place and tested regularly to ensure functionality.
 Critical utilities must be configured in a redundant manner to ensure continued
functionality.

Housekeeping (if third party)


 Housekeeping/cleaning staff must go through standard information security
awareness training.
 Where external or third parties are used for cleaning services, the third party
must be insured and bonded.

(Company) Internal Page 2 of 5


(Company) Physical Security Policy

 Housekeeping/cleaning staff must have adequate and approved background


checks performed.
 Housekeeping/cleaning staff must be (supervised/monitored) while performing
required duties.
 Housekeeping/cleaning staff must wear uniforms, badges, and be assigned a
unique identifier that provides an audit trail on access to areas of the facility.
 If housekeeping/cleaning staff need to gain access to restricted areas specific
clearance from security staff must be obtained.

Loading Docks
 Procedures for delivery and receipt of packages must be documented.
 Delivery areas must be secured and isolated from public areas.
 External doors of the delivery area must be secured when internal doors are
open.
 Delivery areas must be locked when unattended. Unauthorized personnel must be
accompanied at all times within delivery areas.
 Surveillance cameras must be secured and adequately cover delivery areas.
 Incoming deliveries must be registered, isolated, and inspected for evidence of
tampering before being moved to internal areas.
 All discovered evidence of tampering must immediately be reported to physical
security personnel.

Definitions
See Appendix A: Definitions

References
 ISO 27002: 7, 9, 11, 13, 16
 NIST CSF: PR.AC, PR.IP, PR.PT, DE.CM
 Continuity and Recovery Policy
 Incident Management Policy

Waivers
Waivers from certain policy provisions may be sought following the (Company) Waiver
Process.

Enforcement
Personnel found to have violated this policy may be subject to disciplinary action, up to and
including termination of employment, and related civil or criminal penalties.
Any vendor, consultant, or contractor found to have violated this policy may be subject to
sanctions up to and including removal of access rights, termination of contract(s), and
related civil or criminal penalties.

Version History
Versio Modified Approved Approved By Reason/Comments
n Date Date

(Company) Internal Page 3 of 5


(Company) Physical Security Policy

1.0.0 August 2020 FRSecure Document Origination

(Company) Internal Page 4 of 5


(Company) Physical Security Policy

NEED HELP?
FRSecure is a full-service information security consultancy.

If you need assistance with anything in this resource, please don’t hesitate to reach out to us.

CONTACT US

(877) 767 – 1891 | 6550 York Ave S #500, Edina, MN 55435

For security emergencies, or quotes on services reach out to us here.

More resources

(Company) Internal Page 5 of 5

You might also like