Direct links from the subject.
| Property | Value |
|---|---|
|
The subject is an instance of a class. |
|
|
The subject is an instance of a class. |
An idea or notion; a unit of thought. |
|
A human-readable name for the subject. |
PR.AA-06.1: Physical access to all organisational assets, including critical zones, shall be managed, monitored, and enforced based on risk. |
|
PR.AA-06.1 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_BASIC_E_p31 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p100 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p72 |
|
|
Relates a concept to a concept that is more general in meaning. |
|
|
A general note, for any purpose. |
<div><p>The goal of this control is to ensure that physical access to all organisational assets, especially in critical zones, is managed, monitored, and enforced based on risk to prevent unauthorised entry and protect sensitive systems. To support this goal, the following actions should be taken:</p><ul><li>Access Control Measures<ul><li>Keys, badges, and alarm codes should be strictly managed.</li><li>Employee access credentials should be collected immediately upon departure.</li><li>Alarm codes should be changed regularly.</li><li>External service providers (e.g. cleaners) should only receive access when necessary, and it should be:<ul><li>Time-limited using technical controls</li><li>Logged electronically for traceability</li></ul></li></ul></li><li>Physical Security Enhancements<ul><li>Critical zones should be protected with physical controls such as:<ul><li>Surveillance cameras</li><li>Security guards</li><li>Locked doors and gates</li><li>Alarm systems</li></ul></li><li>These controls should be placed strategically to monitor and restrict access.</li></ul></li><li>Network Access Protection Internal network ports (e.g. Ethernet) should not be exposed in unsecured areas such as waiting rooms, corridors, or reception zones.</li><li>OT-Specific Considerations<ul><li>PhysicalaccesstoOTenvironments(e.g.controlrooms,cabinets,fielddevices)shouldbelimitedtoauthor- ised personnel only.</li><li>Access should be logged and monitored, and physical barriers should be used where feasible.</li></ul></li><li>Reference For practical tools and templates, refer to the Access Policy in the CyFun® Toolbox on www.cyfun.eu.</li></ul></div> |
|
A general note, for any purpose. |
The goal of this control is to ensure that physical access to all organisational assets, especially in critical zones, is managed, monitored, and enforced based on risk to prevent unauthorised entry and protect sensitive systems. To support this goal, the following actions should be taken: - Access Control Measures - Keys, badges, and alarm codes should be strictly managed. - Employee access credentials should be collected immediately upon departure. - Alarm codes should be changed regularly. - External service providers (e.g. cleaners) should only receive access when necessary, and it should be: - Time-limited using technical controls - Logged electronically for traceability - Physical Security Enhancements - Critical zones should be protected with physical controls such as: - Surveillance cameras - Security guards - Locked doors and gates - Alarm systems - These controls should be placed strategically to monitor and restrict access. - Network Access Protection Internal network ports (e.g. Ethernet) should not be exposed in unsecured areas such as waiting rooms, corridors, or reception zones. - OT-Specific Considerations - PhysicalaccesstoOTenvironments(e.g.controlrooms,cabinets,fielddevices)shouldbelimitedtoauthor- ised personnel only. - Access should be logged and monitored, and physical barriers should be used where feasible. - Reference For practical tools and templates, refer to the Access Policy in the CyFun® Toolbox on www.cyfun.eu. |
|
A general note, for any purpose. |
The goal of this control is to ensure that physical access to all organisational assets, especially in critical zones, is managed, monitored, and enforced based on risk to prevent unauthorised entry and protect sensitive systems. To support this goal, the following actions should be taken: - Access Control Measures - Keys, badges, and alarm codes should be strictly managed. - Employee access credentials should be collected immediately upon departure. - Alarm codes should be changed regularly. - External service providers (e.g. cleaners) should only receive access when necessary, and it should be: - Time-limited using technical controls - Logged electronically for traceability - Physical Security Enhancements - Critical zones should be protected with physical controls such as: - Surveillance cameras - Security guards - Locked doors and gates - Alarm systems - These controls should be placed strategically to monitor and restrict access. - Network Access Protection Internal network ports (e.g. Ethernet) should not be exposed in unsecured areas such as waiting rooms, corridors, or reception zones. - OT-Specific Considerations - PhysicalaccesstoOTenvironments(e.g.controlrooms,cabinets,fielddevices)shouldbelimitedtoauthor- ised personnel only. - Access should be logged and monitored, and physical barriers should be used where feasible. - Reference For practical tools and templates, refer to the Access Policy in the CyFun® Toolbox on www.cyfun.eu. |
|
A general note, for any purpose. |
The goal of this control is to ensure that physical access to all organisational assets, especially in critical zones, is managed, monitored, and enforced based on risk to prevent unauthorised entry and protect sensitive systems. To support this goal, the following actions should be taken: • Access Control Measures o Keys, badges, and alarm codes should be strictly managed. o Employee access credentials should be collected immediately upon departure. o Alarm codes should be changed regularly. o External service providers (e.g. cleaners) should only receive access when necessary, and it should be: - Time-limited using technical controls - Logged electronically for traceability • Physical Security Enhancements o Critical zones should be protected with physical controls such as: - Surveillance cameras - Security guards - Locked doors and gates - Alarm systems o These controls should be placed strategically to monitor and restrict access. • Network Access Protection Internal network ports (e.g. Ethernet) should not be exposed in unsecured areas such as waiting rooms, corridors, or reception zones. • OT-Specific Considerations o PhysicalaccesstoOTenvironments(e.g.controlrooms,cabinets,fielddevices)shouldbelimitedtoauthor- ised personnel only. o Access should be logged and monitored, and physical barriers should be used where feasible. • Reference For practical tools and templates, refer to the Access Policy in the CyFun® Toolbox on www.cyfun.eu. |
|
A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme. |
PR.AA-06.1 |
|
skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties. |
Physical access management and monitoring |
|
A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag. |
Physical access to all organisational assets, including critical zones, shall be managed, monitored, and enforced based on risk. |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
The number of triples associated with the subject. |
21 |
|
Specifies the dataset the subject is part of. |
Resultaten 1 - 23 of 23
Inverse links to the subject.
| Property | Subject |
|---|---|
|
Relates a concept to a concept that is more specific in meaning. |
Resultaten 1 - 1 of 1