According to the CHFI v11 objectives under Setting Up a Computer Forensics Lab and Ensuring Quality Assurance , maintaining strict control over who can access the forensic laboratory is a fundamental security requirement. The scenario described clearly aligns with physical access considerations , which focus on controlling, monitoring, and documenting entry into the forensic facility. Recording visitor details such as identity, time of entry, and purpose of visit ensures accountability and helps protect sensitive evidence, forensic tools, and investigation data from unauthorized access or tampering.
CHFI v11 emphasizes that forensic labs must implement visitor logs, access authorization procedures, and monitoring mechanisms as part of best practices. These measures directly support the chain of custody by demonstrating that evidence was only accessible to authorized individuals, which is essential for legal admissibility. In the event of an audit or court proceeding, access records can be used to prove that evidence integrity was preserved throughout the investigation lifecycle.
Human resource considerations (Option A) relate to staffing, training, and role assignments, not visitor access. Work area considerations (Option B) address workspace layout and equipment placement. Physical and structural design considerations (Option D) involve building architecture and security infrastructure such as locks or surveillance systems, but not the administrative tracking of visitors.
Therefore, in accordance with CHFI v11 forensic lab security guidelines, physical access considerations best describe the security control being implemented
Submit