Under active development Content is continuously updated and improved

PE-4Access Control for Transmission

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Control physical access to organization-defined system distribution and transmission lines within organizational facilities using organization-defined security controls.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Security controls applied to system distribution and transmission lines prevent accidental damage, disruption, and physical tampering. Such controls may also be necessary to prevent eavesdropping or modification of unencrypted transmissions. Security controls used to control physical access to system distribution and transmission lines include disconnected or locked spare jacks, locked wiring closets, protection of cabling by conduit or cable trays, and wiretapping sensors.

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What policies define authorized versus unauthorized transmission and display of information on physical access devices?
  • How does the organization manage access control for areas where information systems process, store, or transmit sensitive information?
  • What is the process for reviewing and updating access control authorization lists?
  • How are physical access violations escalated and investigated?
  • What role do security personnel play in enforcing access control policies at entry points?

Technical Implementation:

  • What information is displayed or transmitted by physical access control devices?
  • How are access control devices configured to minimize information disclosure?
  • What technical controls prevent tampering with access control devices?
  • How are access control device configurations managed and updated?
  • What encryption or security features protect data transmitted by access devices?

Evidence & Documentation:

  • Provide documentation of what information is transmitted or displayed by access control devices.
  • Provide configuration settings showing controls on information display.
  • Provide physical access authorization evidence (e.g., sample badge printouts).
  • Provide records of access control device inventory and accountability.

Ask AI

Configure your API key to use AI features.