| Assessment Date | |
|---|---|
| Assessor(s) | |
| Site/Location |
| Item | Yes/No | Comments |
|---|---|---|
| Is entry to the facility controlled by authentication mechanism (e.g., badge, biometric)? | ||
| Are visitor access logs maintained and reviewed? | ||
| Are unauthorized individuals prevented from accessing restricted areas? | ||
| Are access rights reviewed regularly? |
| Item | Yes/No | Comments |
|---|---|---|
| Is there a physical barrier (fencing, gates) around the data center? | ||
| Is there monitored CCTV coverage of entry/exit points? | ||
| Are security patrols or guards present? |
| Item | Yes/No | Comments |
|---|---|---|
| Are doors and windows reinforced and locked? | ||
| Are delivery/loading docks monitored and controlled? | ||
| Are equipment and cable routes secured? |
| Item | Yes/No | Comments |
|---|---|---|
| Are fire detection and suppression systems in place? | ||
| Is the temperature and humidity controlled? | ||
| Are water leakage and flood detection systems installed? |
| Item | Yes/No | Comments |
|---|---|---|
| Are CCTV cameras installed and operational? | ||
| Is monitoring performed 24/7? | ||
| Are surveillance recordings retained for a defined period? |
| Item | Yes/No | Comments |
|---|---|---|
| Are emergency exits clearly marked and accessible? | ||
| Are evacuation plans documented and visible? | ||
| Are staff trained in emergency procedures? |
| Details |
|---|
| Findings |
|---|