Network Trace
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

01) Does your organisation enforce a secure physical perimeter around all of its physical locations (e.g. offices, data centres...)?

January 30, 2023
Physical Security
Secure Perimeter

Answer yes if your organisation has implemented a secure physical perimeter around all of its physical locations. Please provide a Physical Security Policy document (as a PDF file) as evidence or reference a section of a previously provided security policy in the notes.

A secure physical perimeter is designed to deny unwanted access to a site for the protection of people and site assets. A secure physical perimeter can include:

  • walls or fencing, typically topped with barbed wire to prevent climbing;
  • gates secured with a lock or barrier mechanism or a guard;
  • bollards to prevent vehicle entry and intrusions;
  • shutters to protect premises out of hours;
  • CCTV that is monitored to detect and respond to intrusions;
  • motion detectors that are alarmed.

A physical perimeter is the first line of defence to prevent physical site intrusion and acts to deter intruders, or to delay an intrusion to enable other security protocols (such as alarms or a security team response) to be implemented.

How to implement the control

A secure physical perimeter can be as simple as secure walls, a locked gate or door, and an alarm and CCTV capability for SMEs with offices in which no client data is stored.

A secure physical perimeter for a data centre that may store a lot of confidential information could be much more complex including controls such as man traps.

Your physical security controls will be tested during an information security audit or review, and any gaps in your perimeter controls will be highlighted a recommendation for remediation provided.

If you would like to contribute to this article or provide feedback, please email Contributors will be recognised on our contributors page.

Pattern Trapezoid Mesh

Defend against supply chain attacks with Defend-As-One.

No organisation is an island.