Question: Deliverable 3 : Security Policies Access Control Policy 1 . 0 Purpose The purpose is to implement policies and procedures to ensure that physical access
Deliverable : Security Policies
Access Control Policy
Purpose
The purpose is to implement policies and procedures to ensure that physical access controls exist that ensure that all cardholder data can only be accessed by authorized personnel.
Scope
This policy applies to all employees, contractors, consultants, and temps who utilize IT resources described herein their assigned job responsibilities.
Policy
Facility Access
Facility entry controls will be implemented to limit and monitor physical access to systems that process or transmit cardholder data.
Physical access to publicly accessible network jacks, wireless access points, gateways, and handheld devices will be restricted.
Visitors
Procedures will exist to help personnel to easily distinguish between employees and visitors in areas where cardholder data is accessible.
All visitors will be authorized before entering areas where cardholder data is processed or maintained.
All visitors will be given a token, such as a badge or access device, which identifies them as nonemployees, and will be required to surrender the device before leaving the facility or on the data of expiration.
All visitors to sensitive area must complete a visitors log which will be maintained for a minimum of three months, unless otherwise restricted by law.
Media Controls
All media backups will be stored in a secure location, preferably in an offsite facility, such as an alternate or backup site, or a commercial storage facility.
All paper and electronic media including computers, networking and communications hardware, telecommunication lines, paper receipts, paper reports, and faxes that contain cardholder data will be physically secured.
Strict control will be maintained over the internal and external distribution of any kind of media that contains cardholder data, such that the media is identified as confidential, and will only be sent by secured and traceable courier.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
