Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Physical and environmental security Secure areas

Purpose: To prevent activities that violate the school's information policy

Implementation guidance
The following guidelines should be considered to secure offices, rooms
and facilities:

a.) prohibits unknown or unauthorized individuals from entering the location


where vital papers are housed.

b) It is vital to identify persons both within and outside of the school grounds.

c) Every guard is supposed to secure the school's doors, windows and etc.
that the thief has possible ability to enter or pass through.

d) It is also important to regularly monitor school websites.

e.) It is need to keep crucial papers and valuables in the safest possible
location

Protecting to control against natural threats to our school


Guidelines for Implementation

It is critical to discover or identify the risks that may influence the school and
how to prevent damage from fires, earthquakes, typhoons, and other natural
disasters.
Areas for delivery and loading
Control
Access points such as delivery and loading locations, as well as other
areas where unauthorized people can enter

Guide to Implementation
a) Those who deliver school orders must present their specific ID or other
identification so that security officers may identify them.

b) The distribution of orders shall take place solely outside of the school.

c) A guard must be designated for delivery and loading.


d) Deliveries and loading should be arranged so that students are not
inconvenienced.

Work in secure environments.

Guide to Implementation

a.) First and foremost, pictures are not allowed in vulnerable locations is
prohibited.

b) All employees at this institution must be trustworthy and honest in their job.

b) Always check for malicious items and immediately tell security guards or
authorized personnel.

Implementation guidance

The following guidelines should be considered to protect equipment:

a) installed an uninterruptible power supply (UPS).

b) prior to the disaster equipment, documents, and other valuables should be


secured in a secure location.

c) installed a detector such as a light beam, vibration/sound detector, and


lastly a closed-circuit television.

d) Environmental elements such Temperature and humidity should be


evaluated for conditions that may interfere with the operation of our school's
information processing equipment.
Implementation guidance

The following guidelines for cabling security should be considered:

a.) To avoid contact, it is required to remove or separate the power wire from
another cable.

b) construct a strong cable cover

c) build wires that limit the likelihood of lightning strikes

d.) Always inspect the cables for damage or damage caused by insects like
rats and ants.

Implementation guidance

The following guidelines for equipment maintenance should be


considered:

a) Always inspect and check devices, application locks and other items.

b.) If equipment fails, assign one or two employees to repair it.

c) it must be maintained every week or month

References

ISO/IEC 27002:2022 - Information security controls (2022-02)


by Cesare Gallotti
https://www.iso.org

You might also like