Requirement

F-03: SELECTION OF PHYSICAL SECURITY MEASURES (DEFENCE-IN-DEPTH)

Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.

1. In Security Areas and in premises around, preventive and limiting measures have to be taken into use to ensure the security of the Security Area. Actions to detect and track the intensives have to be included. Procedure to recover normal functions immediately has to be in force.
2. The principle of defence-in-depth has to be used to evaluate and accredit an appropriate and - based on risk assessment - sufficient combination of security measures, consisting of administrative, functional and physical means, like:
a) structural barriers: physical obstacle(s) which sets the boundary for Security Areas and the premises around it, causing complications and delays for the intrusion;
b) Access control: access to Security Areas and premises around them is limited with access control mechanisms. The goal is to detect unauthorized attempts, to prevent the access of unauthorized people and to monitor the individuals moving around and inside the area. Access control may be targeted on an area, on one or more facilities on the area, on areas within facilities or on rooms. The monitoring may be based on mechanical or electronic systems or on the combination of these or on some other physical means. Security personnel, receptionist and own personnel may be used as part of the monitoring procedure.
c) Intrusion detection system: in order to improve the security level given by a perimeter barrier, an intrusion detection system (burglar alarm) may be used. The system may also be used in place of, or to assist, security staff.
d) Security personnel: trained, supervised and, where necessary, appropriately security-cleared security personnel may be employed, inter alia, in order to deter individuals planning covert intrusion.
e) CCTV: closed circuit camera surveillance may be used on Security Areas or around it especially for preventing illegal intelligence actions and other unwanted actions, as well as for verification of alarms and unexpected findings. The security personnel may use CCTV as a real time tool for monitoring or as a passive means to analyze the footage.
f) Measures which maintain the level of security: Definition of responsibilities and tasks. Various processes and working models, like the management of access rights and keys, introduction of new personnel and instructing them, and the service and maintenance processes of different systems.
g) Lighting: the possible intruder may be detected with the help of proper lighting. It also makes the monitoring of the area more efficient for the guarding personnel either visually or by using the CCTV.
h) Other relevant physical measures aiming at preventing or detecting unauthorized access or to prevent the loss or damage of Classified Information.
3) The devices have to be inspected and serviced on a regular basis.

This requirement is part of the framework:  
Katakri 2020
Best practices
How to implement:
F-03: SELECTION OF PHYSICAL SECURITY MEASURES (DEFENCE-IN-DEPTH)
This policy on
F-03: SELECTION OF PHYSICAL SECURITY MEASURES (DEFENCE-IN-DEPTH)
provides a set concrete tasks you can complete to secure this topic. Follow these best practices to ensure compliance and strengthen your overall security posture.

1. In Security Areas and in premises around, preventive and limiting measures have to be taken into use to ensure the security of the Security Area. Actions to detect and track the intensives have to be included. Procedure to recover normal functions immediately has to be in force.
2. The principle of defence-in-depth has to be used to evaluate and accredit an appropriate and - based on risk assessment - sufficient combination of security measures, consisting of administrative, functional and physical means, like:
a) structural barriers: physical obstacle(s) which sets the boundary for Security Areas and the premises around it, causing complications and delays for the intrusion;
b) Access control: access to Security Areas and premises around them is limited with access control mechanisms. The goal is to detect unauthorized attempts, to prevent the access of unauthorized people and to monitor the individuals moving around and inside the area. Access control may be targeted on an area, on one or more facilities on the area, on areas within facilities or on rooms. The monitoring may be based on mechanical or electronic systems or on the combination of these or on some other physical means. Security personnel, receptionist and own personnel may be used as part of the monitoring procedure.
c) Intrusion detection system: in order to improve the security level given by a perimeter barrier, an intrusion detection system (burglar alarm) may be used. The system may also be used in place of, or to assist, security staff.
d) Security personnel: trained, supervised and, where necessary, appropriately security-cleared security personnel may be employed, inter alia, in order to deter individuals planning covert intrusion.
e) CCTV: closed circuit camera surveillance may be used on Security Areas or around it especially for preventing illegal intelligence actions and other unwanted actions, as well as for verification of alarms and unexpected findings. The security personnel may use CCTV as a real time tool for monitoring or as a passive means to analyze the footage.
f) Measures which maintain the level of security: Definition of responsibilities and tasks. Various processes and working models, like the management of access rights and keys, introduction of new personnel and instructing them, and the service and maintenance processes of different systems.
g) Lighting: the possible intruder may be detected with the help of proper lighting. It also makes the monitoring of the area more efficient for the guarding personnel either visually or by using the CCTV.
h) Other relevant physical measures aiming at preventing or detecting unauthorized access or to prevent the loss or damage of Classified Information.
3) The devices have to be inspected and serviced on a regular basis.

Read below what concrete actions you can take to improve this ->
Frameworks that include requirements for this topic:
No items found.

How to improve security around this topic

In Cyberday, requirements and controls are mapped to universal tasks. A set of tasks in the same topic create a Policy, such as this one.

Here's a list of tasks that help you improve your information and cyber security related to
F-03: SELECTION OF PHYSICAL SECURITY MEASURES (DEFENCE-IN-DEPTH)
Task name
Priority
Task completes
Complete these tasks to increase your compliance in this policy.
Critical
No other tasks found.

How to comply with this requirement

In Cyberday, requirements and controls are mapped to universal tasks. Each requirement is fulfilled with one or multiple tasks.

Here's a list of tasks that help you comply with the requirement
F-03: SELECTION OF PHYSICAL SECURITY MEASURES (DEFENCE-IN-DEPTH)
of the framework  
Katakri 2020
Task name
Priority
Task completes
Complete these tasks to increase your compliance in this policy.
Critical
Principle of layered protection
Critical
High
Normal
Low

The ISMS component hierachy

When building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.

Framework

Sets the overall compliance standard or regulation your organization needs to follow.

Requirements

Break down the framework into specific obligations that must be met.

Tasks

Concrete actions and activities your team carries out to satisfy each requirement.

Policies

Documented rules and practices that are created and maintained as a result of completing tasks.

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.