Mastering physical security
As seen before, the main security mechanisms in physical security are based on preventing non-authorized users from gaining physical access to your systems.
However, there are some additional mechanisms that you can leverage to enhance your physical defensive security. These additional mechanisms and strategies are discussed in the following sections.
Clean desk policy
This policy is not about having the desk clean of dust and food, but about restricting what employees can leave unattended on their workstations. The following are some examples to take into consideration:
- Cabinets must be locked at all times when the user is not at the desk.
- NO papers, notes, or other sources of data should be left unattended on the desk.
- NO removable devices (such as USB drives) should be left unattended (either connected or disconnected from the computer).
- NO sensitive personal information (SPI) or personal identifiable information (PII) should...