Entering and accessing information systems to any degree within any organization must be
controlled. What’s more, it is necessary to understand what is allowed and what is not;
if those parameters are clearly defined, the battle is half won. Not every building is a highsecurity
facility, so it’s understandable that some of the following items might not apply to
your organization; however, there should be a good, clear reason as to why they don’t. Here
are sample questions to consider: [25]
• Are policies and procedures developed and implemented that address allowing
authorized and limiting unauthorized physical access to electronic information
systems and the facility or facilities in which they are housed?
• Do the policies and procedures identify individuals (workforce members, business
associates, contractors, etc.) with authorized access by title and/or job function?
• Do the policies and procedures specify themethods used to control physical access, such
as door locks, electronic access control systems, security officers, or video monitoring?
The facility access controls standard has four implementation specifications [26]: