Page 725 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 725

or computer rooms need not be human compatible.

               Understand the security concerns of a wiring closet. A wiring
               closet is where the networking cables for a whole building or just a

               floor are connected to other essential equipment, such as patch panels,
               switches, routers, LAN extenders, and backbone channels. Most of the
               security for a wiring closet focuses on preventing physical
               unauthorized access. If an unauthorized intruder gains access to the
               area, they may be able to steal equipment, pull or cut cables, or even

               plant a listening device.
               Understand how to handle visitors in a secure facility. If a

               facility employs restricted areas to control physical security, then a
               mechanism to handle visitors is required. Often an escort is assigned
               to visitors, and their access and activities are monitored closely.
               Failing to track the actions of outsiders when they are granted access
               to a protected area can result in malicious activity against the most

               protected assets.

               Know the three categories of security controls implemented
               to manage physical security and be able to name examples of
               each. The security controls implemented to manage physical security
               can be divided into three groups: administrative, technical, and
               physical. Understand when and how to use each, and be able to list
               examples of each kind.

               Understand security needs for media storage. Media storage

               facilities should be designed to securely store blank media, reusable
               media, and installation media. The concerns include theft, corruption,
               and data remnant recovery. Media storage facility protections include
               locked cabinets or safes, using a librarian/custodian, implementing a
               check-in/check-out process, and using media sanitization.

               Understand the concerns of evidence storage. Evidence storage
               is used to retain logs, drive images, virtual machine snapshots, and

               other datasets for recovery, internal investigations, and forensic
               investigations. Protections include dedicated/isolated storage
               facilities, offline storage, activity tracking, hash management, access
               restrictions, and encryption.
   720   721   722   723   724   725   726   727   728   729   730