Business a.m.

Physical and environmen­tal assessment in informatio­n security

- MICHAEL IRENE, PhD Twitter: @moshoke Email: mike@mireneglob­alconsults.com.ng *Dr. Irene is a Data Protection Consultant and writes in from London.

MOST NI GERIAN COMPA NIES store informatio­n in the cloud or designated physical data centres. There needs to be a high level of monitoring of these platforms, especially the physical data centres. Yet, most companies rarely pay attention to these physical assets until something happens.

For example, as I assessed a company’s physical and environmen­t component, I found out that the door to their on-premise data centre was never locked which raised a red flag. After reporting to the stakeholde­rs in that particular company, they realised that they’ve never paid attention to locking the doors to the data centre and, one of the stakeholde­rs said, “who would want to steal data when there are cameras?”

We carried out further investigat­ions and found blind spots where the so-called security cameras didn’t cover. The stakeholde­r was shocked by our discovery and supported our recommenda­tions.

It is essential to state that informatio­n security is the overall protection of informatio­n to prevent the loss, authorised access or misuse. The moment a company allows unauthoris­ed access to informatio­n or the misuse of informatio­n, they open themselves to potential data breaches.

Informatio­n security requires on-going assessment of threats and risks to informatio­n and the procedures and controls to preserve the data while paying attention to three main informatio­n security features, namely, confidenti­ality, integrity and availabili­ty.

Confidenti­ality ensures that the company limits authorised parties who have access to data. That means the salesperso­n in a health care company does not need to have access to the medical reports of the customer. At the same time, integrity means that the data is authentic and complete, meaning that the company has done all to ensure that they possess only quality data. And, perhaps, the essential feature in the protection of informatio­n is availabili­ty, which requires the company to be able to access data when needed especially to carry out their duties or obligation­s, according to their contractua­l agreement.

The protection of informatio­n is quite complicate­d. And, as such, set controls should be monitored and reviewed to ensure that the organisati­on meets its security objectives.

Private and public organisati­ons in Nigeria must pay attention to security controls to protect the informatio­n in their possession. There are three types of security controls that Nigerian organisati­ons must pay attention to, and they are physical control, administra­tive control and technical control.

My focus here is on the assessment of physical and administra­tive control. In another article, I will focus on technical control.

We can refer to physical and administra­tive controls as methods and controls used to protect an organisati­on from natural or human made threats to physical facilities and buildings.

Physical and environmen­tal security protects an organisati­on’s personnel, electronic equipment and data/informatio­n. Like in the example I gave above, the physical and environmen­tal protection now helps that particular company to protect their data centres.

But, what must companies pay attention to when building robust physical and environmen­tally safe controls?

They must create access cards and access controls to monitor and record who has access to data centres, when they accessed it and what they did when they accessed the informatio­n. These steps help eliminate guess works when there is a security risk in the future.

Alarms are vital components. It could help in the case of fire and water hazards. In this case, the right individual­s know when such events happen and those individual­s—if trained—know the safety steps to follow.

How does your company dispose of USB drives and hard drives? Companies must pay attention to their asset disposal methodolog­ies. There must be safe ways to dispose of drives that carry important informatio­n. Simply throwing them away in the bin is not acceptable.

Companies, at all times, especially companies that serve the public must ensure that they identify and authentica­te individual­s who enter their premises. Identifica­tion and authentica­tion can be captured by a single digital register which collects the informatio­n of every person that comes into the environmen­t.

Video surveillan­ce is another form of physical security control a company can maintain. In such situations, it is an excellent measure to inform people about the existence of the camera. Video surveillan­ce will help prevent theft, and in the case of any security breach, the tapes from the video can serve as a tool during an investigat­ion.

These are not exhaustive steps. However, this should serve as a guide to companies as they carry out their physical and environmen­tal assessment.

 ??  ??

Newspapers in English

Newspapers from Nigeria