PE.L1-B.1.IX
Manage Visitors & Physical Access
FCI Data
Security Requirement
Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices.
USU Policy, Procedures, and Standards
University Policy 5200: Information Security and Appropriate Use
- Section 2.2 - Appropriate Use and Terms of Use
- Section 2.3 - Device and Endpoint Management and Security
- Section 3.3 - Information Technology and IT Staff
Policy refers to control of devices and accountability for protecting IT resources from unauthorized access.
University Policy 2402: Public Safety, Response, and Reporting
USU manages building access according to the building type and purpose and considers security in the maintenance of campus facilities.
NIST Cybersecurity Framework v2
- Protect (PR): PR.PS-02 - Visitor access is managed, monitored, and logged.
Implementation Details
Documentation should include details to meet the Security Requirement for this control. Complete this list for each system or systems that process or access FCI data:
- List the procedures in place to ensure that visitors are properly identified, signed in, and escorted.
- List how visitor access is controlled in areas where FCI systems are used or stored.
- List any monitoring or logging used to track visitor presence or activities.
- List any additional safeguards used to protect FCI during or after visitor presence.
Document How
- visitors are escorted
- visitor activity is monitored
- audit logs of physical access are maintained
- physical access devices are identified
- physical access devices are controlled
- physical access devices are managed
Example
All visitors to secured IT areas must check in at the front desk and are issued a visitor badge. They are escorted at all times by an authorized staff member. Visitor logs are maintained at the point of entry and reviewed as needed. Any unescorted visitor observed in a restricted area must be reported to security immediately.
How might an auditor assess this control?
Method
- Examine:
- Review visitor logs, escort policies, and access control procedures.
- Interview:
- Ask staff how visitors are handled and what steps are taken to ensure they are escorted.
- Test:
- Observe whether visitors are actually escorted in secured areas or attempt to follow visitor procedures.
Objects (examples of items you could present to the auditor)
- Visitor Log Sheets: Physical or digital records of visitors entering restricted areas.
- Escort Policy: Written procedure outlining how visitors are managed.
- Training Materials: Showing staff have been trained on escort and monitoring procedures.
- Badge Logs: Records of issued visitor badges.
- Incident Reports: Records of past visitor access violations or corrective actions.