Skip to main content

Physical Security Training in ISO 27799

$299.00
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
Who trusts this:
Trusted by professionals in 160+ countries
When you get access:
Course access is prepared after purchase and delivered via email
How you learn:
Self-paced • Lifetime updates
Your guarantee:
30-day money-back guarantee — no questions asked
Adding to cart… The item has been added

This curriculum spans the equivalent of a multi-workshop program, addressing the design, implementation, and audit of physical security controls across healthcare facilities in a manner comparable to an internal capability build-out for ISO 27799 compliance.

Module 1: Understanding the Scope and Application of ISO 27799 in Healthcare Environments

  • Determine which physical areas (e.g., data centers, server rooms, medical records storage) fall under ISO 27799 control objectives based on patient data sensitivity.
  • Map existing healthcare facility layouts to ISO 27799 physical security clauses to identify coverage gaps in access-controlled zones.
  • Assess whether outsourced facilities (e.g., offsite backup storage, third-party cloud providers) require contractual alignment with ISO 27799 physical safeguards.
  • Decide how to integrate ISO 27799 physical controls with jurisdiction-specific healthcare regulations such as HIPAA or GDPR.
  • Evaluate the need for separate physical security policies for research labs versus clinical areas handling electronic protected health information (ePHI).
  • Resolve conflicts between clinical workflow efficiency (e.g., rapid access to emergency rooms) and strict physical access logging requirements.
  • Document exceptions where physical security controls cannot be applied due to legacy infrastructure, with risk acceptance justification.
  • Coordinate with facility management to ensure building design changes (e.g., renovations) trigger reassessment of ISO 27799 compliance.

Module 2: Securing Physical Access to Healthcare IT Infrastructure

  • Implement multi-factor access control (e.g., badge + PIN) for server rooms housing systems that store or process ePHI.
  • Configure access logs to capture entry attempts, timestamps, and user identities, ensuring logs are retained for audit and forensic purposes.
  • Define role-based access levels for physical entry (e.g., IT staff vs. cleaning crews) and enforce least privilege principles.
  • Integrate physical access control systems (PACS) with HR systems to automate provisioning and deprovisioning of access rights.
  • Install mantrap or anti-passback systems in high-risk areas to prevent tailgating and unauthorized access.
  • Conduct regular access reviews to identify and revoke obsolete or excessive physical access privileges.
  • Deploy biometric readers in critical zones while addressing usability concerns for staff wearing gloves or masks.
  • Establish procedures for issuing temporary physical access credentials during emergencies without compromising audit trails.

Module 3: Designing and Managing Secure Facility Perimeters

  • Select appropriate fencing, lighting, and intrusion detection systems for external boundaries of data centers or records storage buildings.
  • Position surveillance cameras to cover all entry and exit points while avoiding capture of patient treatment areas to prevent privacy violations.
  • Implement vehicle barriers at facility entrances to prevent ramming attacks on critical infrastructure buildings.
  • Coordinate with local law enforcement on response protocols for perimeter breach alerts from security systems.
  • Assess visibility and line-of-sight around the facility to eliminate hiding spots near sensitive infrastructure.
  • Install seismic or vibration sensors on exterior walls to detect forced entry attempts.
  • Balance public accessibility (e.g., patient parking, ambulance bays) with controlled access to secure zones.
  • Conduct regular testing of perimeter alarms and document false alarm rates to tune system sensitivity.

Module 4: Securing Workstations and Mobile Devices in Clinical Settings

  • Deploy cable locks or secure docking stations for workstations on wheels (WOWs) used in patient care areas.
  • Configure automatic screen locking after inactivity on clinical devices, ensuring it does not disrupt time-sensitive care tasks.
  • Enforce policies for securing mobile devices (e.g., tablets, smartphones) when not in use, including storage in locked carts.
  • Implement centralized monitoring of device location and status for lost or stolen equipment reporting.
  • Train clinical staff on secure handling of devices during patient transport or shift changes.
  • Use geofencing to trigger alerts or disable devices if they are removed from authorized facility zones.
  • Establish procedures for sanitizing or decommissioning devices before repair or disposal.
  • Integrate device security with endpoint detection and response (EDR) systems to correlate physical and digital threats.

Module 5: Managing Visitor and Contractor Access

  • Require all visitors and contractors to sign in at reception and wear visible, time-limited badges.
  • Assign escorts for contractors working in restricted areas, with documented responsibilities for supervision.
  • Verify contractor compliance with physical security requirements before granting site access (e.g., background checks).
  • Issue temporary access credentials with limited scope and duration, automatically expiring after project completion.
  • Log all contractor activities involving physical access to IT infrastructure or records storage.
  • Restrict contractor access to specific time windows outside peak clinical operations.
  • Conduct post-visit audits to verify that no unauthorized equipment (e.g., USB drives, cameras) was introduced.
  • Coordinate with procurement to include physical security clauses in vendor service agreements.

Module 6: Securing Storage and Handling of Physical Records

  • Store paper medical records in fire-resistant, locked cabinets with controlled key distribution.
  • Implement dual custody requirements for accessing high-sensitivity records (e.g., behavioral health, VIPs).
  • Define secure transport procedures for moving physical records between departments, including sealed envelopes and logs.
  • Install motion-activated recording in records storage rooms to detect unauthorized access.
  • Conduct periodic audits of physical record check-out and return logs for discrepancies.
  • Designate secure areas for temporary record processing (e.g., transcription, coding) with restricted access.
  • Establish destruction procedures for expired records using cross-cut shredders or licensed destruction vendors.
  • Map record storage locations to disaster recovery plans, ensuring offsite storage meets physical security standards.

Module 7: Surveillance and Monitoring Systems Integration

  • Select camera resolution and frame rates based on area risk level (e.g., higher detail for server rooms).
  • Ensure video retention periods align with legal and regulatory requirements for incident investigation.
  • Integrate CCTV systems with access control logs to correlate entry events with visual verification.
  • Restrict access to video footage to authorized security personnel to prevent misuse.
  • Position cameras to avoid capturing confidential patient interactions or sensitive procedures.
  • Conduct regular system health checks to verify camera uptime and storage integrity.
  • Implement tamper detection on cameras and alert on signal loss or obstruction.
  • Use video analytics (e.g., loitering detection) in low-staffed areas while managing false alert thresholds.

Module 8: Emergency Response and Physical Incident Management

  • Integrate physical security systems with fire alarm and mass notification systems for coordinated response.
  • Define lockdown procedures for active threat scenarios, including manual override of access controls.
  • Conduct unannounced drills to test response times for physical breaches or unauthorized access.
  • Establish communication protocols between security, IT, and clinical leadership during physical incidents.
  • Deploy panic buttons in high-risk areas (e.g., pharmacies, labs) with direct link to security dispatch.
  • Preserve physical evidence (e.g., access logs, video) following a security incident for investigation.
  • Review incident reports to identify recurring vulnerabilities in physical access or monitoring.
  • Ensure emergency responders have pre-authorized access to critical areas without compromising audit trails.

Module 9: Physical Security Audits and Continuous Improvement

  • Develop audit checklists aligned with ISO 27799 physical control requirements for routine assessments.
  • Conduct surprise access tests using "social engineering" techniques to evaluate staff adherence to protocols.
  • Review access logs and CCTV footage quarterly to detect anomalies or policy violations.
  • Validate that physical security controls are reflected in risk assessments and treatment plans.
  • Track remediation of audit findings with assigned owners and deadlines.
  • Compare physical security posture across multiple facilities to standardize best practices.
  • Update physical security policies annually or after significant infrastructure or regulatory changes.
  • Use audit results to justify investment in physical security upgrades or staff training.