Controlling Access to the Physical System

This section explains the recommended steps necessary to control access to the physical system. These steps include:

  • Controlling access to the computer room

  • Controlling access to devices outside the computer room

Physical Access Control

Physical access control involves controlling access to the physical components of the system. Measures such as the following, for example, are essential:

  • The system and its component parts must be protected against deliberate damage.

  • Storage media, such as tape reels and disk platters, must be protected from unwarranted removal. Once such storage media are removed from the site, the data on them can be read or corrupted.

  • Operator display terminals (ODTs), which are capable of sending commands that bypass system security checks, must be protected against unauthorized access.

Your installation might prefer that the operations staff work primarily at ODTs that require operator log-on.

This arrangement enables you to

  • Audit the actions of those operators.

  • Trace operations activities to specific operators.

For information on setting up an ODT log-on system, see Controlling File Access.

It is beyond the scope of this guide to describe

  • Fire protection and disaster planning

  • Security-screening of personnel

  • Plant security

  • The structural requirements for a secure building