Laserfiche WebLink
<br />©2025 Lumifi Cyber, Inc. All rights reserved. <br />PRIVATE - Controlled by Lumifi Cyber <br /> <br />24/25 <br />PRIVATE - Controlled by Lumifi Cyber <br />• Are access records logged, where are they logged, and how long are the <br />logs being retained for? <br />• Fail open or fail closed? <br />• Is the card key system patched regular (just like other computers on the <br />network)? <br />• Door force alarms? Who responds? <br />• Keys <br />• Masters/submasters in use? How are they issued, to whom? <br />• Do you re-core any affected lock when a key is lost or not returned upon <br />employee separation/termination? <br />• Are key safes in use? <br />• Does your team control file cabinet keys? If not, who does? <br />• PIN pad entry <br />• Are all codes unique to an individual? <br />• Do the PIN system log accesses and identify the person who used the PIN <br />pad for entry? <br />• Cameras/Video Monitoring <br />• All locations? <br />• Are videos streams monitored in real time or only after an incident? <br />• Where are the videos stored, and how long are they being retained <br />for? <br />• Is the video monitoring system patched regular (just like other <br />computers on the network)? <br />• For the video monitoring in datacenters, are all ingress/egress <br />cameras located within the datacenter and facing the door from the <br />inside? <br />• Describe Fire/Water/Temp alerts in Datacenters <br />• Describe business continuity plan for facilities including back -up generators <br />and the amount of time available based on fuel storage <br />• Describe media destruction and disposal – shred bins? Contracted <br />destruction services? <br />