ISO IEC 17799 2000TRANSLATED INTO PLAIN ENGLISHSection 7: Physical and Environmental SecurityDETAILED STANDARD |
||
ISO 17799 2000 is now OBSOLETE. See ISO 27002 2013. |
7.1 USE SECURE AREAS TO PROTECT FACILITIES |
|
|
Use physical methods to control access
|
|
Use physical methods to prevent people from
damaging |
|
Identify the areas within your facility that
should receive |
|
Use secure areas to protect sensitive
|
|
Use entry controls to protect your
|
|
Make sure that your physical protection
methods |
7.1.1 USE PERIMETERS TO PROTECT SECURE AREAS |
|
|
Use physical security perimeters and barriers
to protect |
|
Make sure that your physical security
perimeters |
|
Make sure that your physical security barriers
and |
|
Make sure that external doors and entrance
|
|
Restrict building access to authorized personnel. |
|
Use physical barriers to prevent unauthorized access. |
|
Make sure that physical barriers are used to
prevent |
|
Make sure that external perimeter doors
|
|
Make sure that all external perimeter doors
|
7.1.2 USE ENTRY CONTROLS TO PROTECT SECURE AREAS |
|
|
Use physical entry controls to protect secure areas. |
|
Make sure that your physical entry controls
ensure that |
|
Make sure that visitors to secure
|
|
Make sure that you supervise
|
|
Record the date and time visitors
|
|
Make sure that all visitors to secure areas
|
|
Make sure that all visitors to secure areas
are |
|
Use physical controls to restrict
|
|
Use physical controls to restrict access
|
|
Validate the identity of all persons
|
|
Ensure that all persons who access
|
|
Maintain a record of all access to secure areas. |
|
Review access rights to secure areas on a regular basis. |
|
Update access rights to secure areas on a regular basis. |
7.1.3 USE DESIGN STRATEGIES TO PROTECT SECURE AREAS |
|
|
Design your secure areas to withstand natural disasters. |
|
Design secure areas to withstand man‑made disasters. |
|
Design your secure areas in accordance with
all |
|
Protect your secure areas from security
threats |
|
Site secure areas in order to avoid public access to them. |
|
Site secure area photocopiers and other
equipment so |
|
Design your information processing facilities
in |
|
Use locks to control access to secure areas. |
|
Lock all information processing facility doors
and |
|
Install external window protections
|
|
Use intruder detection systems
|
|
Make sure that your intruder detection systems
|
|
Make sure that your intruder detection systems
comply |
|
Test your intruder detection systems on a regular basis. |
|
Keep unoccupied secure areas alarmed at all times. |
|
Separate physically your information
processing |
|
Prevent public access to internal directories
and documents that |
|
Site fallback equipment away from secure areas
|
|
Site backup media away from secure areas
|
|
Store hazardous materials away from secure areas. |
|
Store combustible materials away from secure areas. |
7.1.4 USE WORK GUIDELINES TO PROTECT SECURE AREAS |
|
|
Use guidelines to control the work that
|
|
Use guidelines to control the work that
|
|
Allow third party support service personnel to
access |
|
Monitor third party access to your secure areas. |
|
Ensure that third party access to secure areas is authorized. |
|
Use a need‑to‑know policy to control
|
|
Supervise all work performed in secure areas. |
|
Lock secure areas that are vacant. |
|
Check secure areas that are vacant. |
|
Prevent the unauthorized use of photographic
|
7.1.5 USE HOLDING AREAS TO PROTECT SECURE AREAS |
|
|
Control the use of delivery and loading areas. |
|
Separate your delivery and loading areas from
|
|
Make sure that all delivery and loading
functions |
|
Make sure that you restrict access to your holding area. |
|
Make sure that holding area is designed so
that supplies |
|
Make sure that your holding area is designed
so that the |
|
Inspect all incoming supplies and materials
|
|
Record all incoming supplies and materials. |
7.2 PROTECT EQUIPMENT FROM HAZARDS |
|
|
Protect your equipment from
|
|
Protect your equipment from
|
|
Make sure that your physical security
|
|
Make sure that
your physical security
|
7.2.1 SAFEGUARD YOUR EQUIPMENT |
|
|
Site your equipment
so that unnecessary |
|
Isolate all equipment
that requires |
|
Adopt security
measures that protect |
|
Adopt security
measures that protect |
|
Adopt security
measures that protect |
|
Adopt security
measures that protect |
|
Adopt security
measures that protect |
|
Adopt security
measures that protect |
|
Adopt security
measures that protect |
|
Adopt security
measures that protect |
|
Adopt security
measures that protect |
|
Adopt security
measures that protect your |
|
Adopt security
measures that protect your |
|
Adopt security
measures that protect your |
|
Adopt security
measures that protect your |
7.2.2 PROTECT YOUR POWER SUPPLIES |
|
|
Protect your equipment from power failures. |
|
Protect your equipment from electrical anomalies. |
|
Make sure that your power supplies comply with
the |
|
Ensure that electrical power will
|
|
Consider using multiple power feeds. |
|
Use uninterruptible power supplies (UPSs)
|
|
Develop contingency plans to address UPS failures. |
|
Check your UPS equipment on a regular basis. |
|
Test your UPS equipment on a regular basis. |
|
Make sure that you have back‑up generators
|
|
Test your back‑up generators on a regular basis. |
|
Make sure that you have an adequate supply of
fuel available |
|
Make sure that your equipment rooms have emergency power switches. |
|
Make sure that power switches are located near emergency exits. |
|
Attach lightning protection filters to all external communication lines. |
|
Install emergency back‑up lights. |
|
Install lightning protection for all buildings. |
7.2.3 SECURE YOUR CABLES |
|
|
Protect your power lines from
|
|
Protect
your telecommunications cables |
|
Place power lines underground whenever those
lines |
|
Place
telecommunications cables underground whenever
|
|
Use conduits to prevent unauthorized
|
|
Use armored conduit to protect critical systems. |
|
Avoid routing cables and lines through public areas. |
|
Segregate your power lines from your telecommunications cables. |
|
Use locked rooms and boxes at cable inspection and termination points. |
|
Consider using alternative routings. |
|
Consider using alternative transmission media. |
|
Consider using fiber optic cables |
|
Consider
using sweeps to detect the presence
|
7.2.4 MAINTAIN YOUR EQUIPMENT |
|
|
Maintain your
equipment to |
|
Follow the
equipment manufacturer’s
|
|
Follow the
equipment manufacturer’s
|
|
Allow only authorized maintenance people
|
|
Keep a record of all preventive and
|
|
Keep a record of all equipment faults and problems. |
|
Control off‑site equipment maintenance and repair. |
|
Comply with
the requirements that insurance polices |
7.2.5 CONTROL OFF‑SITE EQUIPMENT |
|
|
Make sure that management authorization is
required before |
|
Make sure that off‑site equipment security
measures are at |
|
Take additional equipment security measures to
deal |
|
Make sure that
all appropriate security measures are
|
|
Make sure that
all appropriate security measures are
|
|
Make sure that
all appropriate security measures are
|
|
Make sure that
all appropriate security measures are
|
|
Make sure that your personnel never leave
|
|
Make sure that personnel treat portable
computers |
|
Make sure that your personnel conceal or
disguise |
|
Develop special security measures
|
|
Develop special security measures to address
your |
|
Ensure that your personnel follow your
equipment |
|
Make sure that you have adequate
|
7.2.6 CONTROL EQUIPMENT DISPOSAL |
|
|
Control the disposal
of old or obsolete |
|
Control the re‑use of
old or obsolete |
|
Destroy all data storage devices or securely
overwrite |
|
Ensure that all
licensed software has been overwritten or |
|
Check all storage devices, before you re‑use
or dispose of them, |
7.3 CONTROL ACCESS TO INFORMATION AND PROPERTY |
|
|
Prevent unauthorized
access to your |
|
Prevent the
unauthorized modification |
|
Prevent the theft of your information. |
|
Minimize the damage
that would be |
|
Prevent unauthorized
access to |
|
Prevent the theft of
your information |
|
Minimize the damage
that would be caused by |
7.3.1 ESTABLISH A CLEAR‑DESK AND CLEAR‑SCREEN POLICY |
|
|
Establish a clear‑desk policy to protect
|
|
Use a clear‑desk policy to protect paper. |
|
Use a clear‑desk policy for removable storage media. |
|
Established a clear‑screen policy to protect
|
|
Store important papers in locked cabinets. |
|
Store computer media in locked cabinets. |
|
Store your organization’s most critical or
sensitive |
|
Make sure that users log off when personal
|
|
Protect personal computers, terminals, and
printers by |
|
Protect your incoming and outgoing mail points. |
|
Protect your unattended fax and telex machines. |
|
Protect your photocopiers from unauthorized
|
|
Clear immediately sensitive or classified
|
7.3.2 CONTROL THE REMOVAL OF PROPERTY |
|
|
Make sure that management authorization
|
|
Make sure that management authorization
|
|
Make sure that management authorization
|
|
Make sure that users log out and log
|
|
Make sure that personnel are warned that
spot‑checks |
|
Make sure that you carry out unannounced
spot‑checks |
Also see ISO 27001 2013 Translated into Plain English |
Praxiom Research Group Limited help@praxiom.com 780-461-4514 |
|||
Updated on March 27, 2014. First published on October 28, 2004. |
|||
Legal
Restrictions on the Use of this Page
Copyright © 2004 - 2014 by Praxiom Research Group Limited. All Rights Reserved. |