Physical and Environment Protection (PE) PE-1 – Physical and Environmental Protection Policy and Procedures
Program-specific policies and procedures shall be included in the specific security controls listed below. There is no requirement for the Program to develop additional policy to meet the -1 control.
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-2 – Physical Access Authorizations
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
Issues authorization credentials for facility access;
Click here to enter text.
Reviews the access list detailing authorized facility access by individuals [annually or as policy and procedures dictate changes are required
Click here to enter text.
Removes individuals from the facility access list when access is no longer required
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-3 – Physical Access Control
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
Maintains physical access audit logs;
Click here to enter text.
Provides security safeguards to control access to areas within the facility officially designated as publicly accessible. Physical casings include for example, locking computer racks to protect mission critical servers, network routers, etc. As an alternative, these devices may be secured in a room (e.g., a server room) with access limited to privileged users.
Click here to enter text.
Escorts visitors and monitors visitor activity;
Click here to enter text.
Secures keys, combinations, and other physical access devices;
Click here to enter text.
Inventories physical access devices within as required;
Click here to enter text.
Changes combinations and keys when first installed or used; if believed to have been subjected to compromise and when considered necessary by the cognizant security authority (CSA) and/or when keys are lost, combinations are compromised, or individuals are transferred or terminated.
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-3(1) – Physical Access Control: Information System Access
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-3(2) – Physical Access Control: Facility/Information System Boundaries
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-3(3) – Physical Access Control: Continuous Guards/Alarms/Monitoring
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-4 – Access Control for Transmission Medium
After a relevance determination, this control can be tailored out for standalone IS.
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-5 – Access Control for Output Devices
.
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-5(3) – Access Control for Output Devices: Marking Output Devices
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-6 – Monitoring Physical Access
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
Reviews physical access logs at least every 90 days or as required upon occurrence of physical access incidents;
Click here to enter text.
Coordinates results of reviews and investigations with the organizational incident response capability.
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-6(1) – Monitoring Physical Access: Intrusion Alarms/Surveillance Equipment
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-8 – Access Records
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
Reviews visitor access records at least every 90 days.
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-12 – Emergency Lighting
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-13 – Fire Protection
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-15 – Water Damage Protection
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-16 – Delivery and Removal
Recommended Continuous Monitoring Frequency: Semi-Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-19 – Information Leakage
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
PE-19(1) – Information Leakage: National Emissions/TEMPEST Policies and Procedures
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
Share with your friends: |