When we consider the devastation that can result to an organization from any number of threats and threat actors, it is prudent to have a plan in place to keep that organization running, even if not at full capacity. This type of documentation is referred to as a business continuity plan (BCP).
Edward Hawkins II
Once you’ve successfully completed the physical security of your environment, it is time to examine its logical security. Logical security should reflect the administrative security of the environment. It is the mapping of the administrative security to its logical counterparts.