๐ช๐ต๐ ๐ฃ๐ต๐๐๐ถ๐ฐ๐ฎ๐น ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฅ๐ฒ๐บ๐ฎ๐ถ๐ป๐ ๐๐๐๐ฒ๐ป๐๐ถ๐ฎ๐น ๐๐ผ ๐๐ป๐ณ๐ผ๐ฟ๐บ๐ฎ๐๐ถ๐ผ๐ป ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ถ๐ป ๐๐ฆ๐ข ๐ฎ๐ณ๐ฌ๐ฌ๐ญ
We spend so much time talking about firewalls, encryption, and phishing simulations โ but what happens when someone simply walks into your server room, steals a laptop, and causes damage to companyโs assets?
Why does physical security matter so much? Because many real incidents start physically:
๐ซ A tailgater slipping into a restricted area and accessing sensitive systems.
๐ซUnlocked desks leaving confidential documents visible to visitors or cleaners.
๐ซNatural disasters such as typhoons and flooding disrupting servers, leading to downtime or hardware damage if environmental protections aren't in place.
Physical security directly supports the core principles of information securityโthe CIA Triad (confidentiality, integrity, and availability) of data and systems. Threats such as theft, tampering, or natural disasters can bypass digital protection entirely.
In ISO 27001:2022, physical security is addressed through a dedicated theme under Annex A. Issues like expired fire extinguishers, missing CCTV footage, sticky notes with account passwords, or unlocked server room racks are common findings in an ISO 27001 audit. These are often fixed in a short time but can lead to non-conformities if ignored. Usual physical security practices are as follows:
๐ซ Clear desks and screens (e.g. keep sensitive information in restricted areas)
๐ซPhysical entry and access control (e.g. door access restriction)
๐ซPhysical Monitoring (e.g. CCTV)
๐ซetc.