幸运快三

幸运快三 - I Banner
A student works at a computer

SlateConnect

U of I's web-based retention and advising tool provides an efficient way to guide and support students on their road to graduation.

Physical Protection

Overview

This updated standard is to help align existing practices within Office of Information Technology (OIT) around Physical Protection controls to the requirements in NIST 800-171 (PE | 3.10.x) as well as industry best practices. This document does not give full coverage of 3.10.x controls within 171 due to existing limitations and other requirements that are specific to CUI.

What is in this document:

  • 幸运快三or monitoring requirements
  • Required content of physical logs
  • Standards for physical access devices
  • Remote work requirements

What is NOT in this document:

  • Log locations for physical logs
  • VandalCard or key security standards 

Policy Reference

APM 30.11 University Data Classification and Standards

APM 30.14 Cyber Incident Reporting and Response

APM 40.28 Access Control Policy

APM 95.13 Security Cameras

Purpose

This Physical Protection standard supports APM 30.11 University Data Classification and Standards and other relevant university policies.

Scope

These Standards are the minimum baseline for all managed and unmanaged systems that access, store or process 幸运快三 data (see APM 30.14 C-6) at the High-risk levels (see APM 30.11) or data with relevant regulations such as FCI/CUI not otherwise covered by an approved system security plan.

This specifically includes university-operated data centers but may include other spaces where relevant data may be unencrypted.

Standards

Escort and monitor visitor activity in restricted areas.

  1. 幸运快三ors are escorted in restricted areas.
  2. 幸运快三or logs must be included in the physical access log described below.
    1. These logs must also include the individual escorting the visitor.

Maintain audit logs of physical access to areas in scope.

  1. Access to restricted areas must be recorded either electronically or via a sign-in sheet.
    1. Sign-in sheets must be appropriately secured from tampering as determined by OIT Security.
  2. Audit logs of physical access are maintained for at least three (3) years.
  3. Physical access logs should contain:
    1. The local time that access was provided.
    2. Each individual that access was provided to.
    3. The restricted area being accessed.
    4. The local time each individual exits.