UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

PESP-1 Workplace Security Procedures


Overview

Procedures are implemented to ensure the proper handling and storage of information, such as end-of-day security checks, unannounced security checks, and, where appropriate, the imposition of a two-person rule within the computing facility.

MAC / CONF Impact Subject Area
CLASSIFIED
SENSITIVE
Medium Physical and Environmental

Details

Threat
Information not handled and stored properly is at risk of unauthorized access, copying, and distribution.

Guidance
1. Procedures shall be implemented to ensure the proper handling and storage of information.
2. End-of-day (EOD) security checks shall take place to verify the handling and storage of information deemed necessary in accordance with agency and facility standard operating procedures.
3. Unannounced security checks shall take place to verify the handling and storage of information deemed necessary in accordance with agency and facility standard operating procedures.
4. Two-person rule shall take place when appropriate to verify the handling and storage of information deemed necessary in accordance with agency and facility standard operating procedures.

References

    N/A