LogoLogo
  • TRUST CENTER
    • Trust Center Syntphony
    • Security
      • Security Organizational Model
      • Security Governance Approach
      • Security Risk Management
      • People Security
      • Identity and Access Management
      • Secure Software Development
      • Acceptable User of Assets
      • Security Operations & Security Incident Management
      • Security in IT Operations
      • Physical Security
      • Suppliers Security Management
    • Conformity
    • Business Continuity
      • Business Continuity Approach
    • Support Model
      • Customer Support Policy
        • Support Plans
          • Support Case Severity
          • Support Limitations
          • Technical Account Manager
        • Value Added Services
          • Product Upgrade Plan
          • Case Escalation
          • Lifecycle Policy And Legacy Support
          • Proactive Business Monitoring
      • Service Level Agreements
        • Definitions
        • Customer Obligations
        • Service Credits
          • Maximum Financial Credit
        • Exclusions
      • Pricing
  • PRODUCTS
    • Compliance Management
      • Infrastructure
      • Conformity
      • Support Model
        • Customer Obligations
        • SLA Subscriptions
          • Services
          • Incident
          • Service Request & change Management
          • System availability
          • Limitations
          • Definitions
          • Overarching services
          • Sandbox workspace
        • Business Continuity
        • Security
    • Content Services
      • Privacy
        • Manages Privacy - SaaS
        • Manages Privacy - On Premise
      • Infrastructure
      • Conformity
    • Conversational AI
      • Privacy
      • Infrastructure
      • Conformity
    • Employee Intranet
      • Infrastructure
      • Conformity
    • Immersive Experiences
      • Privacy
        • Meta Privacy Notice
        • Meta Privacy Notice - NAKA
      • Infrastructure
      • Conformity
    • Intelligent Automation
      • Privacy
      • Infrastructure
      • Conformity
    • Intelligent Document Processing
      • Privacy
      • Infrastructure
      • Conformity
    • Knowledge Search
      • Privacy
      • Infrastructure
      • Conformity
    • Learning Tech
      • Privacy
      • Infrastructure
      • Conformity
    • Loyalty
      • Privacy
      • Infraestructure
      • Conformity
    • Mobility Management
      • Privacy
      • Infrastructure
      • Conformity
    • Operation Transformation Strategy
      • Infrastructure
      • Conformity
    • Payments
      • Privacy
      • Infrastructure
      • Conformity
    • Perfect Store
      • Infrastructure
    • Pricing Management
      • Infrastructure
    • Process Management
      • Privacy
      • Infrastructure
      • Conformity
    • Sales
      • Privacy
      • Infrastructure
      • Conformity
    • Security Privacy and Integrity Platform
      • Infrastructure
    • Short-term Power Trading
      • Privacy
      • Infrastructure
      • Conformity
    • Smart Multi-cloud Management
      • Privacy
      • Infrastructure
      • Conformity
    • Stations
      • Privacy
      • Infrastructure
      • Conformity
    • Virtual Care
      • Privacy
        • Manages Privacy - SaaS
        • Manages Privacy - On Premise
      • Infrastructure
      • Conformity
Powered by GitBook

About us

  • Syntphony website
  • NTT DATA Syntphony solutions

Syntphony © NTT DATA Spain, S.L.U 2025 - All rights reserved

On this page

Was this helpful?

Export as PDF
  1. TRUST CENTER
  2. Security

Physical Security

The physical security requirements, roles and responsibilities, as well as the security areas and controls to be implemented and maintained, are defined in the Physical and Environmental Security Standard.

There are four physical security levels, which are based on the type of information, assets, processes, and services managed within office areas.

Each security area has adequate physical security controls such as access control systems, CCTV surveillance, and environmental protection to safeguard information and other assets.

Access rights to security areas are provided based on the "need to know" and "least privilege" principles, and are reviewed, withdrawn, and audited accordingly. Rules have been defined for issuing, wearing, and returning physical access cards, as well as managing physical keys. Turnstiles, automated doors or other physical barriers are set, and may only be passed with the access cards & rights.

Specific instructions to provide visitors with access and accompany them in designated areas have been defined as well. An access log of visitors is kept in each location.

Physical security measures are be implemented to prevent or mitigate damage by fire, flood, earthquake, explosion, civil unrest, and other forms of natural or man-made disasters. The standard also covers security aspects regarding external areas, delivery and loading areas, and discontinued offices.

PreviousSecurity in IT OperationsNextSuppliers Security Management

Last updated 4 months ago

Was this helpful?