Expert Advice Community

Guest

How to protect secure areas

  Quote
Guest
Guest user Created:   Jan 13, 2016 Last commented:   Jan 13, 2016

How to protect secure areas

0 0

Assign topic to the user

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

Guest
AntonioS Jan 13, 2016

I´m looking for more detail information linked to the Physical security in ISO 27001: How to protect the secure areas. I´d like to know either there are some more detailed information linked to the 4 level protection zones.

What are the minimum protective measures for Level 1, 2,3 and 4 ? can  you share with me some example of proper zoning concept and its measures and Norm with chapter which is about this Topic.

 

Answer:

I am sorry but we do not have specific information about the 4 levels protection zones (level 1, 2, 3 and 4), and ISO 27001 does not use the zoning concept. Anyway, regarding the Annex A of ISO 27001:2013, A.11.1 Secure areas, you can find these controls and establish different levels of protection:

A.11.1.1 Physical security perimeter: It is the reception, where any people can enter and says “I am Antonio Segovia, from ISO27001Academy, and I want to talk with Bill Gates"
A.11.1.2 Physical entry controls: If the previous point is ok (Bill Gates knows me and approves my entry), they give me a card to pass the fir st physical entry control of Microsoft (by the way, my entry is registered: date, hour, etc). 
A.11.1.3 Securing offices, rooms and facilities: Bill Gates is in the facility A of the Microsoft Campus, and in the entry of each facility there is another physical entry. But no problem, with my visit card I can enter (only to the facility A)
A.11.1.5 Working in secure areas: Inside of each facility there are secure areas where people are working with very confidential information (for example working about prototypes, or working about military or governmental projects, etc) and additional security controls are necessary.

For more information about the implementation of these controls, you can read the ISO 27002:2013, which is a code of best practices for the implementation of the controls of the Annex A of ISO 27001:2013. And this article can be also interesting for you “Physical security in ISO 27001: How to protect the secure areas” : https://advisera.com/27001academy/blog/2015/03/23/physical-security-in-iso-27001-how-to-protect-the-secure-areas/
Additionally from the software point of view, you need to implement security controls related to the access control, to avoid unauthorized access to the information (the information can be in servers, desktops, laptops, etc). For this, you can use the A.9 Access control of the Annex A of ISO 27001:2013 (and again ISO 27002:2013 for more information about the implementation of each control). This article can be also interesting for you “How to handle access control according to ISO 27001” : https://advisera.com/27001academy/blog/2015/07/27/how-to-handle-access-control-according-to-iso-27001/

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Jan 13, 2016

Jan 13, 2016

Suggested Topics