Label is commonly seen and required to identify things especially in cables. Without proper identification, it will be tedious in trouble-shooting.
There is always debates on label. On one hand, it eases operation and maintenance tasks but on the dark side, it exposes the usage of the marked item. A mitigation is to assign label ID and mark this is the drawing. This requires resources to sustain the documentation when changes occur and regular inventory check to validate the marking is still correct.
For the illustration, it has certain pitfall for insights.
- It exposes the location is for military purpose, a target for threat actor to penetrate or attack.
- “No trespassing” is unlikely enforceable especially during political conflict time.
Ultimately, this requires the holistic assessment to balance the signage, back-end enforcement mechanism and cater for unexpected scenarios. All these are the attributes of writing a good policy that can be practically achieved. That said, don’t just copy textbook knowledge and apply to your organization cybersecurity policies. This must be deemed to fail.