According to the CHFI v11 objectives underSetting Up a Computer Forensics LabandEnsuring Quality Assurance, maintaining strict control over who can access the forensic laboratory is a fundamental security requirement. The scenario described clearly aligns withphysical access considerations, which focus on controlling, monitoring, and documenting entry into the forensic facility. Recording visitor details such as identity, time of entry, and purpose of visit ensures accountability and helps protect sensitive evidence, forensic tools, and investigation data from unauthorized access or tampering.
CHFI v11 emphasizes that forensic labs must implementvisitor logs, access authorization procedures, and monitoring mechanismsas part of best practices. These measures directly support thechain of custodyby demonstrating that evidence was only accessible to authorized individuals, which is essential for legal admissibility. In the event of an audit or court proceeding, access records can be used to prove that evidence integrity was preserved throughout the investigation lifecycle.
Human resource considerations (Option A) relate to staffing, training, and role assignments, not visitor access. Work area considerations (Option B) address workspace layout and equipment placement. Physical and structural design considerations (Option D) involve building architecture and security infrastructure such as locks or surveillance systems, but not the administrative tracking of visitors.
Therefore, in accordance with CHFI v11 forensic lab security guidelines,physical access considerationsbest describe the security control being implemented
Submit