System Security Plan (ssp) Categorization: Moderate-Low-Low


Physical and Environment Protection (PE)



Download 0.65 Mb.
Page14/16
Date02.05.2018
Size0.65 Mb.
#47206
1   ...   8   9   10   11   12   13   14   15   16

Physical and Environment Protection (PE)

  1. PE-1 – Physical and Environmental Protection Policy and Procedures


Program-specific policies and procedures shall be included in the specific security controls listed below. There is no requirement for the Program to develop additional policy to meet the -1 control.

Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

      1. PE-2 – Physical Access Authorizations


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



Issues authorization credentials for facility access;

Click here to enter text.


  1. Reviews the access list detailing authorized facility access by individuals [annually or as policy and procedures dictate changes are required

Click here to enter text.

  1. Removes individuals from the facility access list when access is no longer required

Click here to enter text.

CONTINUOUS MONITORING STRATEGY

Click here to enter text.

PE-2(3) – Physical Access Authorizations: Restrict Unescorted Access


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

      1. PE-3 – Physical Access Control


Recommended Continuous Monitoring Frequency: Quarterly

Program Frequency:




  1. Maintains physical access audit logs;

Click here to enter text.

  1. Provides security safeguards to control access to areas within the facility officially designated as publicly accessible. Physical casings include for example, locking computer racks to protect mission critical servers, network routers, etc. As an alternative, these devices may be secured in a room (e.g., a server room) with access limited to privileged users.

Click here to enter text.

  1. Escorts visitors and monitors visitor activity;

Click here to enter text.

  1. Secures keys, combinations, and other physical access devices;

Click here to enter text.

  1. Inventories physical access devices within as required;

Click here to enter text.

  1. Changes combinations and keys when first installed or used; if believed to have been subjected to compromise and when considered necessary by the cognizant security authority (CSA) and/or when keys are lost, combinations are compromised, or individuals are transferred or terminated.

Click here to enter text.

CONTINUOUS MONITORING STRATEGY

Click here to enter text.

PE-3(1) – Physical Access Control: Information System Access


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

PE-3(2) – Physical Access Control: Facility/Information System Boundaries


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

PE-3(3) – Physical Access Control: Continuous Guards/Alarms/Monitoring


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

      1. PE-4 – Access Control for Transmission Medium


After a relevance determination, this control can be tailored out for standalone IS.

Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

      1. PE-5 – Access Control for Output Devices


.

Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

PE-5(3) – Access Control for Output Devices: Marking Output Devices


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

      1. PE-6 – Monitoring Physical Access


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:




  1. Reviews physical access logs at least every 90 days or as required upon occurrence of physical access incidents;

Click here to enter text.

  1. Coordinates results of reviews and investigations with the organizational incident response capability.

Click here to enter text.

CONTINUOUS MONITORING STRATEGY

Click here to enter text.

PE-6(1) – Monitoring Physical Access: Intrusion Alarms/Surveillance Equipment


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

      1. PE-8 – Access Records


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:




  1. Reviews visitor access records at least every 90 days.

Click here to enter text.

CONTINUOUS MONITORING STRATEGY

Click here to enter text.

      1. PE-12 – Emergency Lighting


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

      1. PE-13 – Fire Protection


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

      1. PE-14 – Temperature and Humidity Controls


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

      1. PE-15 – Water Damage Protection


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

      1. PE-16 – Delivery and Removal


Recommended Continuous Monitoring Frequency: Semi-Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

      1. PE-17 – Alternate Work Site


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

      1. PE-19 – Information Leakage


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.

PE-19(1) – Information Leakage: National Emissions/TEMPEST Policies and Procedures


Recommended Continuous Monitoring Frequency: Annual

Program Frequency:



CONTINUOUS MONITORING STRATEGY

Click here to enter text.



    1. Download 0.65 Mb.

      Share with your friends:
1   ...   8   9   10   11   12   13   14   15   16




The database is protected by copyright ©ininet.org 2024
send message

    Main page