Examples of Physical Security Perimeter in a sentence
Physical Security Plan — The Responsible Entity shall create and maintain a physical security plan, approved by a senior manager or delegate(s) that shall address, at a minimum, the following:R1.1. Processes to ensure and document that all Cyber Assets within an Electronic Security Perimeter also reside within an identified Physical Security Perimeter.
CIP-006-1 — Requirement 1.1 requires a Responsible Entity to have a physical security plan that stipulate cyber assets that are within the Electronic Security Perimeter also be within a Physical Security Perimeter.
PACSs are defined in the NERC Glossary of Terms as follows: Physical Access Control Systems (PACSs): “Cyber Assets that control, alert, or log access to the Physical Security Perimeter(s),[35] exclusive of locally mounted hardware or devices at the Physical Security Perimeter such as motion sensors, electronic lock control mechanisms, and badge readers.” The systems that make up PACSs are often used to control and monitor physical access to Facilities and systems on the BES where BES Cyber Systems reside.
CIP-006-1 — Additional Compliance Information 1.4.4 identifies dial-up accessible assets that use non-routable protocols as a special class of cyber assets that are not subject to the Physical Security Perimeter requirement of this standard.
A Compliance Enforcement Authority (CEA) evaluates each Physical Security Perimeter (PSP) according to the requirements of the standard; thus, a PSP with multiple owners would mean each owner is required to demonstrate compliance with the standards.
Access rights may differ from one perimeter to another.• Special Locks: These include, but are not limited to, locks with “restricted key” systems, magnetic locks that can be operated remotely, and “man-trap” systems.• Security Personnel: Personnel responsible for controlling physical access who may reside on-site or at a monitoring station.• Other Authentication Devices: Biometric, keypad, token, or other equivalent devices that control physical access into the Physical Security Perimeter (PSP).
Documentation identifying the methods for controlling physical access to each access point of a Physical Security Perimeter as specified in Requirement R2.M3.
Access rights may differ from one perimeter to another. Special Locks: These include, but are not limited to, locks with “restricted key” systems, magnetic locks that can be operated remotely, and “man‐trap” systems. Security Personnel: Personnel responsible for controlling physical access who may reside on‐site or at a monitoring station. Other Authentication Devices: Biometric, keypad, token, or other equivalent devices that control physical access into the Physical Security Perimeter (PSP).
NITC Standards and Guidelines, Information Security Policy 8-101, Section 4.5.1, Physical Security Perimeter, states the following, in relevant part:Agencies will perform a periodic threat and risk assessment to determine the security risks to facilities that contain State information .
Record date of December 6, 2019 WorldReginfo - c9c950e6-5c18-4b07-be1b-1ee5c66fbed8Payment date of December 9, 2019: The effective payment of the intermediate dividend to both registered shareholders and holders of dematerialised shares will occur on December 9, 2019.