Skip to main content

PES-01.2: Zone-Based Physical Security

PES 3 — Low Protect

Mechanisms exist to implement a zone-based approach to physical security.

Control Question: Does the organization implement a zone-based approach to physical security?

General (1)
Framework Mapping Values
TISAX ISA 6 3.1.1
US (1)
Framework Mapping Values
US NERC CIP 2024 (source) CIP-006-6 1.2

Capability Maturity Model

Level 0 — Not Performed

There is no evidence of a capability to implement a zone-based approach to physical security.

Level 1 — Performed Informally

C|P-CMM1 is N/A, since a structured process is required to implement a zone-based approach to physical security.

Level 2 — Planned & Tracked

C|P-CMM2 is N/A, since a well-defined process is required to implement a zone-based approach to physical security.

Level 3 — Well Defined

Physical & Environmental Security (PES) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Performs the centralized-management of physical security controls across the enterprise. o Maintains a current list of personnel with authorized access to organizational facilities and implements physical access management controls.

  • A physical security team, or similar function:
  • A facilities maintenance team, or similar function, manages the operation of environmental protection controls.
  • Administrative processes exist to authorize physical access to facilities based on the position or role of the individual.
  • Administrative processes and physical controls restrict unescorted access to facilities to personnel with required security clearances, formal access authorizations and validated the need for access.
  • Administrative processes exist to ensure Business Process Owners (BPOs) develop and maintain System Security Plans (SSPs) or similar documentation, to identify and maintain key architectural information on each business-critical system, application or service.
Level 4 — Quantitatively Controlled

See C|P-CMM3. There are no defined C|P-CMM4 criteria, since it is reasonable to assume a quantitatively-controlled process is not necessary to document a Site Security Plan (SitePlan) for each server and communications room to summarize the implemented security controls to protect physical access to technology assets, as well as applicable risks and threats.

Level 5 — Continuously Improving

See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to document a Site Security Plan (SitePlan) for each server and communications room to summarize the implemented security controls to protect physical access to technology assets, as well as applicable risks and threats.

Assessment Objectives

  1. PES-01.2_A01 a zone-based approach to physical security is developed.
  2. PES-01.2_A02 a zone-based approach to physical security is implemented.

Evidence Requirements

E-PES-11 Physical Security Zones

Documented evidence of security safeguards controlling access to designated physical security zones within facilities.

Physical Security

Technology Recommendations

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage this control in SCF Connect

Track implementation status, collect evidence, and map controls to your compliance frameworks automatically.