LOG-12: Is physical access logged and monitored using an auditable access control
system?
The organization should monitor and log all physical access via the following means: a. Verifying physical access of individuals when they enter secure areas. b. Maintaining physical access logs for the facilities c. Escorting visitors at all times. d. Reviewing access control logs regularly.
The organization should use either video cameras or access control mechanisms (or both) to monitor individual physical access to sensitive areas. Review collected data, correlate with other entries, and store the data for at least three months (unless otherwise restricted by law.)
The organization should implement physical and/or logical controls to restrict access to publicly accessible network jacks. For example, limit physical access to wireless access points, gateways, handheld devices, networking/communications hardware, and telecommunication lines.
The organization should develop procedures to distinguish between onsite personnel and visitors with an emphasis on the following considerations: e. Identifying onsite personnel and visitors (for example, assigning badges) f. Changing access requirements g. Revoking or terminating onsite personnel and expired visitor identification
The organization should develop procedures to control physical access for onsite personnel to sensitive areas as follows: h. Access should be authorized and based on individual job functions. i. Access should be revoked immediately upon termination. Furthermore, all physical access mechanisms, such as keys, access cards, etc., must be returned or disabled.
Control implemented
Control ownership
Description
Monitor and log physical access using an auditable access control
system.