PJ_Sneakers wrote: » Do you handle any type of forensics where you need to secure physical devices? If so, you might be able to use SWGDE's guidelines for digital evidence labs.
markulous wrote: » I thought there was something in NIST or another standard that stated that any privileged info couldn't be seen by anyone walking by. Or maybe it was just a vague FISMA requirement, I can't recall.
dmoore44 wrote: » You might be able to use a data classification standard to categorize active incident information at a higher level than operational information, and then as @cyberguypr alluded to, use another NIST pub to justify using a secure storage facility as a separate space.
TheFORCE wrote: » A lot of the standards and policies are vague on purpose so that they can be applied to various scenarios and so that those who follow the standards can implement the controls by different means. As an example, the below quote is taken from DoIT. As you can see, they state that any confidential information should be protected with 3 types of safeguard, administrative, technical and physical. Since they mention "physical" it is implied that if someone is working with confidential information that person should be in a location with other people that work on the same type of information, if they are not, then you are not using physical safeguards. By being vague, they can apply the policy to different situations as times change. "Confidential information should be protected with administrative, technical, and physical safeguards to ensure its confidentiality, integrity, and availability and to prevent unauthorized or inappropriate access, use, or disclosure." http://doit.maryland.gov/publications/doitsecuritypolicy.pdf Policies and standards are like that, they are open to interpretations so they can be applied in different situations.