You have
Employee Resources
Employee Resources
- News
- Events
- Winter Storm Event 2023
-
- Deferred Compensation
- Employee Assistance Program
- eForms
- Email Services
- Benefits
- Employee Self Service
- Lactation Accommodation Request Form
- Dimensions System
- VHR Program
- Employee Safety and Health
- Staying Connected
- Kaiser Occ Health
- Flexible Spending Account
- Disaster Worker
- Trainings
- Drug-Free Workplace
-
- Preface
- 1-1 Advisory Bodies Roles and Relationships
- 1-2 Providing County Support of Grant Applications from Outside Agencies
- 2-1 Policy for Submitting Agenda Items
- 2-2 Departmental Representation at BOS Meetings
- 2-3 Policy for Board Chambers Security
- 3-1 Policy for Appropriation Transfers
- 3-2 Travel and Meal Reimbursements
- 3-3 Interdepartmental Billings for Services Policy
- 3-4 Policy for Memberships to Professional Associations & Organizations – Use of Public Funds
- 4-1 Performance Evaluations
- 4-2 Policy for Position Allocation List
- 4-3 Position Reclassifications
- 4-4 EEO Policy
- 4-5 Departmental/Internal Reorganizations
- 4-6 Policy for Hiring/Retaining Personnel Services in EMP or Ind. Contractor Status - See Civil Service Rules
- 4-7 Policy for Flexible Merit Increases
- 4-8 Advanced Salary Step Appointments
- 4-9 Policy for Relocation Incentives
- 4-10 Medical Leave Policy
- 4-11 Preemployment Preplacement Screening Policy
- 4-12 COVID-19 Vaccination and Testing Policy
- 4-13 Telework Policy
- 4-14 Lactation Policy
- 5-1 Vehicle Use
- 5-2 Policy for Capital Project and Asset Responsibility
- 5-3 Public Art Policy
- 6-1 Records Retention Storage Destruction Policy
- 6-2 Incompatible Activities Policy
- 6-3 TTrD Policy
- 6-4 Safety Management Policy
- 6-5 Identity Theft Prevention Program
- 7-1 Purchasing Policy
- 7-2 Real Property Acquisition and Management Policy
- 8-1 Investigations of Alleged Inappropriate Activities
- 8-2 Reasonable Suspicion Policy
- 8-3 Safety and Security for County Employees
- 8-4 Policy for Receipt and Distribution of Tickets or Passes
- 9-1 Official Use of Social Media Sites Policy
- 9-2 IT Use and Security Policy
- 9-3 Website Accessibility Policy
- 9-4 Information Technology Professionals Policy
- 9-5 Information Technology Governance Policy
- 9-6 Information Technology Artificial Intelligence (AI) Policy
- Employee & Volunteer Engagement & Recognition (EVER)
- Combined Fund Drive
- Website Accessibility Assistance
- Back to Administrative Policy Manual
9-4 Information Technology Professionals Policy - Section XI: Physical and Environmental Security Policy
Return to Information Technology Professionals Policy Table of Contents
What’s on this Page
Section XI: Physical and Environmental Security Policy
Read next: Section XII: Technical Vulnerability Management Policy
XI. Physical and Environmental Security Policy
This Policy establishes requirements for physical and environmental security controls.
- Facility Controls
Physical and environmental security controls for each facility must be reasonable and commensurate with the nature and degree of criticality of the Local Agency IT resources and data involved. - Secure Perimeters
Security perimeters must be used to protect areas that contain Local Agency IT resources and data. Security perimeters include, but are not limited to, entry point with proximity card access, locked doors, walls, staffed reception areas or other physical barriers. - Physical Entry Controls
- Facilities housing Local Agency IT resources and data must be protected by entry controls to ensure only authorized individuals are allowed to access.
- Public areas and other points of entry (e.g., exterior doors, loading docks) that could be used by unauthorized individuals must be controlled; and if possible isolated from data centers to avoid unauthorized access.
- Environmental Controls
Local Agency IT resources and data must be protected against environmental threats. Controls must be applied and provide for:- Prevention, detection, and suppression of fires;
- Prevention, detection, and minimization of water damage; and
- Protection, detection, and minimization of loss or disruption of business operations due to electrical power fluctuations or failure.
- Control Monitoring
Physical access and environmental controls must be monitored, tested and maintained regularly. - IT Resource Infrastructure Security
The physical IT resource infrastructure must be protected. Protective controls commensurate to the risk of losing confidentiality, integrity, or availability must be applied to:- The physical components of the network, including but not limited to data centers, wiring closets, server rooms and storage facilities where Local Agency IT resources are stored; and
- Supporting facilities such as electrical supply and cabling infrastructure.
- IT Resource Maintenance
Local Agency IT resources must be maintained to ensure their continued availability and integrity. - Off-Site Locations
Off-site refers to locations (e.g., home, leased locations) where Local Agencies do not have the authority to establish physical and environmental controls. To ensure the security of Local Agency IT resources located off-site, controls must be applied reasonable and commensurate with the nature and degree of criticality of the Local Agency IT resources and data involved, including, but not limited to- Authorization of Local Agency IT resources located off-site;
- Recording of off-site authorizations and inventory of Local Agency IT resources located off site; and
- For Users authorized to take Local Agency IT resources off-site; provide awareness of their responsibilities to protect Local Agency IT resources and data, and of security risks associated with off-site locations.