Physical security: simply put is the system, hardware, technology and practices that protect physical
assets within a space.
And there are several threats and vulnerabilities within this.
APPROACH AND METHODOLOGY
1. Interview with key stakeholders
2. Walk throughs
3. Physical Inspection
4. Documentation Review
5. Risk analysis.
AUDITING PHYSICAL SECURITY
1. Is access control implemented (Access controls doors in place and functioning well?)
2. Is risk assessment done on an annual basis?
3. Are resigned staff removed from the system and denied the right to access the company
facility? (what is the process for withdrawing access to disengaged staff)
4. Verify that security men are in place
5. Verify that CCTV is installed and it covers critical angles and there is proper lighting
6. Verify that security perimeters have been established to protect information processing
facility e.g. walls
7. Physical access to facilities is logged and monitored ie datacentre, Disaster recovery site
8. Physical access to information systems that store, process or transmit Institutional Data is
secured in a manner that prevents unauthorized access
9. Is there fire and safety drills? (How often is this conducted)
10. Is there a provisioning process for individuals requiring access to critical facilities/sites i.e.
datacentre, Disaster recovery site
11. What entry controls have been established to ensure that only authorized personnel are
allowed access to restricted areas?
12. What suitable intruder detection systems are installed for this area
13. are visitors escorted within facilities.
14. What controls are in place to minimize the risk of theft, Fire, Explosions, smoke, water, Dust,
Vibration, chemical effects, electrical supply interference & electromagnetic radiation?
15. Are there signages and alarms (Fire alarm, emergency signage and lighting)
16. Are fire extinguishers serviced regularly?
17. Training and awareness done for employees to enable them to have necessary knowledge
and competencies to effectively perform their physical security responsibilities.
18. Are there policies in place to this effect and do they conform with best practices and
standards? (Security policy, access control policy)