Continuous monitoring of physical access to critical facilities

Critical
High
Normal
Low

Access to buildings containing critical systems must be constantly monitored to detect unauthorized access or suspicious activity. The following issues should be taken into account in monitoring practices:

  • touch, sound or motion detectors that trigger an intrusion alarm
  • covering exterior doors and windows using sensors
  • supervision of unstaffed and otherwise important (e.g. server or communication technology) premises
  • regular testing of alarm systems

Information related to surveillance systems should be kept confidential, as disclosure of information can facilitate undetected breaches. The monitoring systems themselves must also be properly protected, so that the recordings or system status cannot be affected without permission.

Connected other frameworks and requirements:
7.4: Physical security monitoring
ISO 27001
9.3 (MIL1): Implement IT and OT Asset Security as an Element of the Cybersecurity Architecture
C2M2

Security services in real estates

Critical
High
Normal
Low

Organisation's premises and the operating environments of the equipment are actively protected by security.

Connected other frameworks and requirements:
11.1.1: Physical security perimeter
ISO 27001
PR.AC-2: Physical access control
NIST CSF
DE.CM-2: The physical environment monitoring
NIST CSF
7.1: Physical security perimeters
ISO 27001
7.4: Physical security monitoring
ISO 27001

Camera surveillance in real estates

Critical
High
Normal
Low

Security personnel use camera surveillance to verify unauthorized access, sabotage, or other alarms at the organization's premises.

Connected other frameworks and requirements:
11.1.1: Physical security perimeter
ISO 27001
PR.AC-2: Physical access control
NIST CSF
DE.CM-2: The physical environment monitoring
NIST CSF
7.1: Physical security perimeters
ISO 27001
7.4: Physical security monitoring
ISO 27001
No items found.