DE.CM-02.276

Does your organization monitor physical access control logs for unusual patterns and failed access attempts?

Explanation

Monitoring physical access logs helps identify potential security breaches, such as unauthorized access attempts, access outside normal working hours, or suspicious patterns like multiple failed badge swipes. These logs can reveal when terminated employees attempt to use old credentials or when someone tries to access restricted areas without proper authorization. Evidence could include screenshots of your physical access monitoring system showing alerts for unusual activities, documentation of your log review process, or reports generated from your access control system highlighting anomalies and failed access attempts with timestamps and resolution notes.

Implementation Example

Monitor logs from physical access control systems (e.g., badge readers) to find unusual access patterns (e.g., deviations from the norm) and failed access attempts

ID: DE.CM-02.276

Context

Function
DE: DETECT
Category
DE.CM: Continuous Monitoring
Sub-Category
The physical environment is monitored to find potentially adverse events

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron