Physical Security

The following 22 items are listed by Content Data.
Policies & Procedures

Infrastructure Security Policy

Organizations can use this policy to protect critical systems and assets against physical and cyber threats.
Subscriber Content
Mon, Sep 26, 2022
Policies & Procedures

Data Center Security Policy

This sample policy establishes operational standards for the physical security of a company’s data center.
Subscriber Content
Mon, Aug 29, 2022
Policies & Procedures

Physical and Environmental Security Policy

This sample policy is designed to help organizations prevent unauthorized access, damage and interference to business pr...
Subscriber Content
Mon, Jun 6, 2022
Memos

Security Access Badges Memo

This sample memo serves as a report of an internal audit function’s high-level assessment of the security access badges ...
Subscriber Content
Mon, May 30, 2022
Policies & Procedures

Physical Security Standard Policy

The purpose of this policy is to create and maintain a physically secure environment that protects company property and ...
Subscriber Content
Mon, Sep 6, 2021
Policies & Procedures

Facility Access Controls Policy

This sample policy provides an overview of procedures organizations should perform during the facility access controls p...
Subscriber Content
Mon, Dec 2, 2019
Audit Reports

ISO 27001 Information Security Assessment Report

This audit report focuses on a project baselining an organization’s information security practices, with the purpose of ...
Subscriber Content
Mon, May 6, 2019
Checklists & Questionnaires

Hazard Assessment Checklist and Corrective Action Report

This tool provides questions to consider while conducting periodic hazard assessments.
Subscriber Content
Mon, Jul 16, 2018
Policies & Procedures

Sensitive Data Handling Policy

The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Tue, Dec 5, 2017
Audit Programs

Security Policy Review Audit Work Program

The purpose of this work program is to determine whether the right security policies exist and determine if existing pol...
Subscriber Content
Mon, Jun 1, 2015