IT Governance, Risk, and Compliance

Sep 26 2012   11:58PM GMT

Online Data Communication Access Controls – Part I

Robert Davis Robert Davis Profile: Robert Davis

Access to communication devices should be restricted by physical security access controls. As a particular, access to the communication devices should be restricted in much the same way that access is restricted to a data center. For example, typically, the door to the data center is locked; with entry gained by key, card, badge, or some other authentication technique. However, in many technologies, this may not be possible because the communication devices are physically and organizationally dispersed.

Dispersion of communication devices to insular locations makes it difficult or impossible to establish data center type physical security, especially when communication devices are mobile. In such situations, access should be restricted by installation of physical device locks. These types of locks restrict usage of communication devices to those who possess the appropriate token(s).


Post Note: “Online Data Communication Access Controls – Part I” was originally published through under the title “Online Data Communication Access Controls”

Hot off the dotted line! MetricStream dba ComplianceOnline has commissioned me to contribute training material.

1  Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.
  • gwolo1987
    i want to know what is Data Communication doing ?
    5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: