ABSTRACT
The above Webster’s definition can be restated for the
security practitioner as controlled access. In fact, every
aspect of an IT security practitioner’s job revolves around
the process of defining, implementing, and monitoring
access to information. This includes physical access. When
to use it, how much, and the best way to integrate it with
traditional IT security methods, are concepts the IT security
professionalmust be familiar with. The IT security specialist
need not be an expert, someone else will fill that role, but
effective policies and strategies should take into account the
benefits as well as limitations of physical protection.
Success depends on close collaboration with the physical
security office; they have more than just IT security on their
minds and a mutual respect for each other’s duties goes a
long way. Thus cross training can prove invaluable, parti-
cularly when an incident occurs. In essence, a layered,
multidisciplined approach can provide a secure feeling;
freedom from fear, doubt, etc. Controlled access is security.
SECURITY IS CONTROLLED ACCESS