The physical access to organization's critical systems and devices shall be, on top of the
physical access monitoring to the facility, increased through physical intrusion alarms, surveillance equipment, independent surveillance teams.
Guidance
It is recommended to log all visitors.
Visitors shall have access to secure areas only with permission, after they are appropriately identified and their access rights shall be limited to the necessary facilities. All visits are recorded in the visitor log. In addition, staff have guidelines about safe operating in connection with visits.
Secure areas of the organization cannot be accessed unnoticed. The premises are protected by appropriate access control. Only authorized persons have access to the secure areas.
Organisation's premises and the operating environments of the equipment are actively protected by security.
Access to areas where confidential information is handled or stored should be restricted to authorized individuals through appropriate access control, e.g. using a two-step authentication mechanism such as an access card and a passcode.
Security personnel use camera surveillance to verify unauthorized access, sabotage, or other alarms at the organization's premises.