From the course: IT Security Foundations: Network Security

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Solution: Physical security requirements

Solution: Physical security requirements

From the course: IT Security Foundations: Network Security

Solution: Physical security requirements

(quirky music) - [Instructor] Okay, now let's check our work. I've marked up this document because I wanted to highlight some areas that provide guidance and best practice suggestions to secure your data. 9.2.1 states, we really need to restrict physical access to systems and the cardholder data environment. And then over on the right list some guidance and good practice techniques to help secure your system. 9.2.2 pretty much says that we need to put controls in place to restrict the use of publicly accessible network jacks within the facility. 9.2.3 goes further where we want to restrict access to wireless access points, gateways, networking communications hardware, and telecommunication lines within the facility. And 9.2.4 states, access to consoles and sensitive areas is restricted via locking when not in use. So I wanted you to take the broad strokes of this document to see some really good practice guidelines and how you…

Contents