of the home country financial system, a review of significant home country accounting practices,
a strength of support assessment of the FBO, a summary of condition of U.S. operations, and
comprehensive and individual examination plans.
Refer to SR letter 95-22 (SUP. IB).
9
! Participate in the examination process, as needed, to ensure consistency with the institution’s
supervisory plan and effective allocation of resources, including coordination of on-site efforts
with specialty examination areas and other supervisors, as appropriate, and to facilitate requests
for information from the institution, wherever possible.
Sharing of Information
To further promote seamless, risk-focused supervision, information related to a specific
institution should be provided, as appropriate, to other interested supervisors. Information to be
shared should include the products that are described in this handbook.9 Sharing of these
products with the institution, however, should be carefully evaluated on a case-by-case basis.
The institutional overview, risk assessment, and supervisory plan may not be appropriate for
release if they contain a hypothesis about the risk profile of the institution rather than
assessments verified through the examination process. On the other hand, it may be appropriate
to share the examination program with the institution in the interest of better coordinating
examination activities.
Physical control
2. Planning For a Physical Security Program
Adequate controls are not present to control the physical environment without a plan in place.
The company must create a team that is responsible for designing a physical security
© 2016 The SANS Institute Author retains full rights.
The Importance of Physical Security 5
security team should continually improve the program using the defense in depth method.
Defense in depth is a concept used to secure assets and protect life through multiple layers of
security. If an attacker compromises one layer, he will still have to penetrate the additional layers
to obtain an asset. To give an example of this concept, let us say that you have a computer that an
attacker wants to access. The computer in located inside a locked room within a building. The