A.7.12 Cabling security
- Andy Systems
- ISMS Guides
A.7.12 Cabling Security would include:
-
Physical Access Controls: Documentation and verification of physical access controls to cabling infrastructure, including secure areas, locked cabinets, and restricted access to cabling pathways.
-
Cable Routing and Management: Evidence of proper cable routing and management to avoid accidental damage, tampering, or unauthorized access to network cables.
-
Cable Labeling: Records of cables being properly labeled for identification and traceability, reducing the risk of incorrect connections and facilitating troubleshooting.
-
Cable Inventory: A comprehensive inventory of all cabling components, such as cables, connectors, and patch panels, along with documentation of their locations and purposes.
-
Redundancy and Resilience: Proof of redundancy and resilience measures implemented for critical cabling infrastructure to ensure continuous network connectivity and availability.
-
Cabling Standards Compliance: Documentation showing adherence to relevant cabling standards and best practices, such as ANSI/TIA-568, ISO/IEC 11801, or other applicable standards.
-
Cable Testing and Certification: Records of cable testing and certification to ensure that cables meet performance requirements and specifications.
-
Physical Security Monitoring: Evidence of surveillance and monitoring measures in place to detect any physical tampering or unauthorized access to cabling infrastructure.
-
Change Management: Documentation of change management procedures for cabling modifications, additions, or removals to ensure proper authorization and control.
-
Disaster Recovery Planning: Assurance that cabling infrastructure is included in disaster recovery and business continuity plans to address potential disruptions.
-
Training and Awareness: Evidence of training and awareness programs for staff involved in managing or accessing cabling infrastructure to ensure they understand security protocols and best practices.
By reviewing these pieces of evidence, an auditor can assess whether the organization has implemented appropriate measures to secure its cabling infrastructure, reducing the risk of physical security breaches, network disruptions, and unauthorized access to critical network resources