Use this document to maintain a checklist of the physical security controls detailed in your Information Security Policy and Information Security Risk Assessments. The checklist can then be used to complete routine checks on the compliance of your planned controls.
Complete our short form on this page to download this free resource.