LOG-12: Access Control Logs

Control Family:

Logging and Monitoring

CSF v1.1 References:

PF v1.0 References:

Threats Addressed:

Info icon.

Control is new to this version of the control set and incorporates the following item from the previous version: DCS-08: Unauthorized Persons Entry.

Control Statement

Monitor and log physical access using an auditable access control system.

Implementation Guidance

The organization should monitor and log all physical access via the following means:

  1. Verifying physical access of individuals when they enter secure areas.
  2. Maintaining physical access logs for the facilities
  3. Escorting visitors at all times.
  4. Reviewing access control logs regularly.

The organization should use either video cameras or access control mechanisms (or both) to monitor individual physical access to sensitive areas. Review collected data, correlate with other entries, and store the data for at least three months (unless otherwise restricted by law.) The organization should implement physical and/or logical controls to restrict access to publicly accessible network jacks. For example, limit physical access to wireless access points, gateways, handheld devices, networking/communications hardware, and telecommunication lines. The organization should develop procedures to distinguish between onsite personnel and visitors with an emphasis on the following considerations:

  1. Identifying onsite personnel and visitors (for example, assigning badges)
  2. Changing access requirements
  3. Revoking or terminating onsite personnel and expired visitor identification

The organization should develop procedures to control physical access for onsite personnel to sensitive areas as follows:

  1. Access should be authorized and based on individual job functions.
  2. Access should be revoked immediately upon termination. Furthermore, all physical access mechanisms, such as keys, access cards, etc., must be returned or disabled.

Auditing Guidance

  1. Examine policy for logging and monitoring physical access.
  2. Examine the process to identify such events.
  3. Evaluate the review of these logs.

[csf.tools Note: For more information on the Cloud Controls Matrix, visit the CSA Cloud Controls Matrix Homepage.]

Cloud Control Matrix is Copyright 2023 Cloud Security Alliance.