UCF STIG Viewer Logo

PESP-1 Workplace Security Procedures


Overview

Procedures are implemented to ensure the proper handling and storage of information, such as end-of-day security checks, unannounced security checks, and, where appropriate, the imposition of a two-person rule within the computing facility.

MAC / CONF Impact Subject Area
CLASSIFIED
SENSITIVE
Medium Physical and Environmental

Details

Threat
Information not handled and stored properly is at risk of unauthorized access, copying, and distribution.

Guidance
1. Procedures shall be implemented to ensure the proper handling and storage of information.
2. End-of-day (EOD) security checks shall take place to verify the handling and storage of information deemed necessary in accordance with agency and facility standard operating procedures.
3. Unannounced security checks shall take place to verify the handling and storage of information deemed necessary in accordance with agency and facility standard operating procedures.
4. Two-person rule shall take place when appropriate to verify the handling and storage of information deemed necessary in accordance with agency and facility standard operating procedures.

References

    N/A