Level 1
Description:
This requirement applies to employees, individuals with permanent physical access authorization credentials, and visitors. Authorized individuals have credentials that include badges, identification cards, and smart cards. Organizations determine the strength of authorization credentials needed consistent with applicable laws, directives, policies, regulations, standards, procedures, and guidelines. This requirement applies only to areas within facilities that have not been designated as publicly accessible. Limiting physical access to equipment may include placing equipment in locked rooms or other secured areas and allowing access to authorized individuals only; and placing equipment in locations that can be monitored by organizational personnel. Computing devices, external disk drives, networking devices, monitors, printers, copiers, scanners, facsimile machines, and audio devices are examples of equipment.
Priority: High
Domain: PHYSICAL PROTECTION (PE)
Category: Physical Security
Services Associated with AWS:
- AWS Identity and Access Management (IAM), AWS Security Hub, AWS CloudTrail (for monitoring access events)
Services Associated with Azure:
- Azure Security Center
- Azure Key Vault:
- Azure Active Directory (Azure AD)
Objective Evidence:
- Administrative: documented policies, standards & procedures
- Administrative: supporting documentation to demonstrate how Physical Role Based Access Control (P-RBAC) is implemented
Possible Technology Considerations :
NA
What needs to be answered :
Has the facility/building manager designated building areas as “sensitive” and designed physical security protections to limit physical access to the area to only authorized employees? Are output devices such as printers placed in areas where their use does not expose data to unauthorized individuals? Are lists of personnel with authorized access developed and maintained, and are appropriate authorization credentials issued?
Checks for AWS
- Physical Access Control to Organizational Systems and Equipment
Description: This check ensures that physical access to organizational systems, equipment, and their respective operating environments is limited to authorized individuals. Physical access controls include the use of credentials such as badges, identification cards, and smart cards, as well as the placement of equipment in secured areas and the monitoring of access by organizational personnel.
Checks for Azure
- Physical Access Control to Organizational Systems and Equipment:
Description: This policy check ensures that physical access to organizational systems, equipment, and their respective operating environments is limited to authorized individuals. Physical access controls include the use of credentials such as badges, identification cards, and smart cards, as well as the placement of equipment in secured areas and the monitoring of access by organizational personnel. - Designation of Sensitive Areas:
Description: This policy check verifies that the facility/building manager has designated certain areas as "sensitive" and implemented appropriate physical security protections to restrict access to only authorized employees. It ensures that sensitive areas are clearly identified and access is controlled based on role-based access control (RBAC) principles. - Protection of Output Devices:
Description: This policy check ensures that output devices such as printers, scanners, copiers, and facsimile machines are placed in secure areas where their use does not expose sensitive data to unauthorized individuals. It verifies that access to these devices is restricted to authorized personnel only. - Maintenance of Authorized Personnel Lists:
Description: This policy check validates that the organization maintains up-to-date lists of personnel with authorized access to sensitive areas and equipment. It ensures that appropriate authorization credentials, such as badges or smart cards, are issued to authorized individuals and revoked promptly when necessary.
More Details:
No CUI stored in company facilities. All CUI storage done via AWS services.