Page 725 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 725
or computer rooms need not be human compatible.
Understand the security concerns of a wiring closet. A wiring
closet is where the networking cables for a whole building or just a
floor are connected to other essential equipment, such as patch panels,
switches, routers, LAN extenders, and backbone channels. Most of the
security for a wiring closet focuses on preventing physical
unauthorized access. If an unauthorized intruder gains access to the
area, they may be able to steal equipment, pull or cut cables, or even
plant a listening device.
Understand how to handle visitors in a secure facility. If a
facility employs restricted areas to control physical security, then a
mechanism to handle visitors is required. Often an escort is assigned
to visitors, and their access and activities are monitored closely.
Failing to track the actions of outsiders when they are granted access
to a protected area can result in malicious activity against the most
protected assets.
Know the three categories of security controls implemented
to manage physical security and be able to name examples of
each. The security controls implemented to manage physical security
can be divided into three groups: administrative, technical, and
physical. Understand when and how to use each, and be able to list
examples of each kind.
Understand security needs for media storage. Media storage
facilities should be designed to securely store blank media, reusable
media, and installation media. The concerns include theft, corruption,
and data remnant recovery. Media storage facility protections include
locked cabinets or safes, using a librarian/custodian, implementing a
check-in/check-out process, and using media sanitization.
Understand the concerns of evidence storage. Evidence storage
is used to retain logs, drive images, virtual machine snapshots, and
other datasets for recovery, internal investigations, and forensic
investigations. Protections include dedicated/isolated storage
facilities, offline storage, activity tracking, hash management, access
restrictions, and encryption.

