Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Twins – Physical and Logical – Depend on Each Other

December 1, 2007

Security: What about PCI DSS?

Ting: For any organization that handles card-based payments, the Payment Card Industry Data Security Standard (PCI DSS) looms large over their IT strategies. Complying with this standard requires a thorough evaluation of the organization’s security planning, as well as how the IT department approaches areas such as patching, storage of sensitive information and business continuity.

Security: What about physical access control?

Ting: The physical security of an organization’s data also has to be considered. Section 9.1 of the PCI DSS standard states that organizations must “Use appropriate facility entry controls to limit and monitor physical access to systems that store, process, or transmit cardholder data.” This requires a full overview of how individuals within the company access data, not only through applications but also the physical media that the data is stored on.

Within most companies that are going through PCI compliance projects at the moment, this section of the standard will be covered by getting workers to sign up to an agreed document on security policy. This basically means that the employee is made aware of their responsibilities, and that by signing up to this arrangement they promise not to break the rules.

Security: What about the stealing of data or use without authorization?

Ting: While employee sign-off on the security policy will cover law-abiding members of staff in most circumstances, it does not protect against the threat of internal data being stolen or released without authorization. An example of this would be where an employee has been able to steal credit card data and sell it. Even if the company does go through the process with staff, there is also no way for the company to prove that it is meeting its compliance requirements without a huge amount of work.

To really meet the requirements of this section of the standard, a “converged” approach will be required: Instead of separate solutions for physical and IT security, organizations affected by PCI DSS will have to create a single infrastructure to cover both sectors. Creating this across network and physical access to assets ensures that only authorized users can get access to information via the network as well as defining physically where these users can gain right of entry to data. This “location-based authentication” requires an overview of the entire environment.

Security: Are things already coming together?

Ting: The convergence of security is already taking place in the physical world. Organizations are moving toward using IP-based security video and door access systems on their IT networks. IT is being asked to support the network side of these products, while the facilities management team is being required to take greater care around who can gain access to sensitive computer equipment within specific areas of the building. Posts with responsibility for both physical and IT security are being created to handle information security and to control risk.

Security: What will accelerate this process?

Ting: The ability to define security policies around both IT and physical security: using an employee’s network log-in and correlating it with their identity within a physical access system means that the company can apply policies around how a user is allowed to use information.

An example of this might be enforcing signing into the physical access system in the morning: If a user forgets to authenticate themselves, there is no record in the building access database. If they have the right network credentials, they will be granted onto the IT system. In a converged security environment, the network ID is correlated with a badge number and the building access system can be queried automatically to check whether someone has swiped in. If not, they can either be denied access, or be asked a series of questions to check that they are who they say they are.

This policy will ensure that the company’s rules on physical security are followed more closely, and it also creates an audit trail showing user activity across both physical and IT assets. This ability to audit user behavior means that organizations can prove that employees are following the security policies that are in place rather than either ignoring or working around them.

Security: So who is in charge?

Ting: Currently within most organizations, the security and facilities management team will handle physical security concerns while the IT team is responsible for the network and the IT assets of the organization. Defining an information security policy that covers both physical and IT access means going beyond the traditional “silo” mentality that currently exists within many companies.

By getting these teams to work together, organizations can meet the requirements of PCI DSS on converged security, but can also create a security system that is tighter overall and proves that it is meeting the company’s needs. Being able to control how users access information, where they can use their applications and the policies that are in place around security will be an essential part of meeting the needs of PCI DSS.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0918-cyber-feature-slide1_900px

    Facebook fixes Messenger bug that allowed Android users to spy on each other

    See More
  • Logical and Physical Vulnerabilities, According to the Black Hats

    See More
  • Biometrics Bridges Physical, Logical Security

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • effective.jpg

    Effective Physical Security, 5th Edition

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing