Use this document to maintain a checklist of the physical security controls detailed in your Information Security Policy and Information Security Risk Assessments. The checklist can then be used to complete routine checks on the compliance of your planned controls.
Complete our short form on this page to download this free resource.
If you’re looking for a tool that helps you to manage your information security threats and vulnerabilities with ease, book a demo of our Activ Secure software tool, a comprehensive Information Security Management System.