PE.L1-B.1.VIII
Limit Physical Access
FCI Data
Security Requirement
Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.
USU Policy, Procedures, and Standards
University Policy 5200: Information Security and Appropriate Use
- Section 2.2 - Appropriate Use and Terms of Use
- Section 2.3 - Device and Endpoint Management and Security
- Section 3.3 - Information Technology and IT Staff
Policy refers to control of devices and accountability for protecting IT resources from unauthorized access.
University Policy 2402: Public Safety, Response, and Reporting
USU manages building access according to the building type and purpose and considers security in the maintenance of campus facilities.
NIST Cybersecurity Framework v2
- Protect (PR): PR.PS-01 - Physical access to assets is managed and protected.
Implementation Details
Documentation should include details to meet the Security Requirement for this control. Complete this list for each system or systems that process or access FCI data:
- List how access to spaces housing FCI systems (e.g., servers, workstations) is physically restricted to authorized individuals.
- List the mechanisms used to control physical access (e.g., key cards, locks, guards).
- List how access rights are approved, managed, and reviewed.
- List any additional measures taken to secure physical environments where FCI is accessed.
Document How
- authorized individuals allowed physical access are identified
- physical access to organizational systems is limited to authorized individuals
- physical access to equipment is limited to authorized individuals
- physical access to operating environments is limited to authorized individuals
Example
Server rooms and FCI work areas are secured by HID proximity card readers, and only authorized personnel have card access. Access requests must be submitted through USU Facilities and approved by departmental leadership. Logs of physical entry are reviewed quarterly. Visitors are escorted at all times, and keys are retrieved during offboarding.
How might an auditor assess this control?
Method
- Examine:
- Review access control policies, physical entry logs, and building security configurations.
- Interview:
- Ask staff how physical access is approved, restricted, and monitored.
- Test:
- Attempt to enter restricted areas without authorization or observe access enforcement in practice.
Objects (examples of items you could present to the auditor)
- Physical Access Policy: Documentation of who is allowed into sensitive areas and how that is enforced.
- Access Logs: Reports showing who entered secure areas and when.
- Badge Assignment Records: Lists of individuals with key card or physical key access.
- Facility Diagrams: Highlighting physically protected areas and access points.
- Visitor Procedures: Instructions or forms used to control and track temporary access.
- Offboarding Checklist: Confirmation that physical access is removed when no longer required.