From the course: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 23,200 courses taught by industry experts.

Visitor management

Visitor management

- [Instructor] You may need to allow visitors access to your secured facilities. It's important to have visitor control procedures in place that describe who may authorize visitor access and how visitors may behave in your facilities. Your visitor access procedures should clearly identify the allowable reasons that a visitor might enter your facilities and the appropriate levels of approval required for different types of visitors under different circumstances. These procedures should also explain what types of visitors, if any, may be granted unescorted access to the facility and who may escort other visitors. Each time a visitor enters a secure facility, you should maintain a log of that access. This may be as simple as asking visitors to sign a paper visitor register, or it may use a more complex electronic process. All individuals inside a secure facility should wear identification badges that they clearly display on their person. Badges for visitors should be distinctive enough…

Contents