Considerations for use of AI in protective security and guidance on defending against AI enabled threats
Electronic attack of physical security systems is the means of carrying out a localised cyber-attack specifically on the security system. This can be to corrupt data, open a portal or disable alarms.
Guidance for data centre owners and users. You should use this guidance to inform your own risk management strategy that is unique to your organisation’s needs
Data centres operators and their customers should both have individual risk management strategies designed to protect their critical assets and systems.
Data centres operators and their customers should both have individual risk management strategies designed to protect their critical assets and systems.
Here you can find information on further external resources and standards relevant to data centre security
Data centres operators and their customers should both have individual risk management strategies designed to protect their critical assets and systems
Data centres operators and their customers should both have individual risk management strategies designed to protect their critical assets and systems
The destruction of sensitive items should be undertaken via a secure process. This section provides those responsible for information assurance and physical security with best practice guidance
Guidance for those responsible for planning the movement of sensitive items on the need for protective security during transportation
Sensitive information and assets, whatever their form, must be appropriately protected from creation through to verified destruction.
Tamper indicating equipment can be used to provide physical evidence of unauthorised access to a secure area or object.
Guidance to provide high level, practical advice to anyone looking to formulate a Site Security Plan, assisting in developing a proportionate plan which aims to mitigate Terrorist and State threats, whilst supporting in countering many other types of security or safety threats.