S 2.333 Secure use of meeting, event and training rooms

Initiation responsibility: IT Security Officer, Head of Organisation

Implementation responsibility: User

There should be defined rules for using these rooms in every organisation. These should, amongst other things, include general behavioural rules for the users, but also rules regarding the use of both stationary and brought devices.

In this, the following aspects should be taken into account, amongst other things:

The respective contact persons should be informed in the event of problems such as a lack of paper for flipcharts or faulty equipment so that these problems can be eliminated promptly.

As a matter of principle, there are two contradictory solutions for locking meeting, event, and training rooms. If the room is locked permanently, except during times of use, the IT contained therein is protected properly against a host of threats, but spontaneous use of the room is not possible. On the contrary, permanently unlocked meeting, event, and training rooms can be used at any time, but the risk for the IT is significantly higher. Locking these rooms furthermore provides the advantage of the equipment of the training room being left in the desired condition. From an information security point of view, meeting, event, and training rooms must be locked when they are not being used. At the same time, it must naturally be ensured that access is possible quickly and easily in case of need. The keys for the meeting, event, and training rooms should be administered by a central location (e.g. gatekeeper or internal service).

In meeting, event, and training rooms, there is usually no place to lock away documents, IT systems, and such like. For this reason, it should be possible to lock such rooms or have an internal employee keep an eye on the room when all participants leave the room.

Review questions: