Under active development Content is continuously updated and improved

PE-06Monitoring Physical Access

Low
Moderate

>Control Description

a

Monitor physical access to the facility where the system resides to detect and respond to physical security incidents;

b

Review physical access logs organization-defined frequency and upon occurrence of organization-defined events or potential indications of events; and

c

Coordinate results of reviews and investigations with the organizational incident response capability.

>Discussion

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i.e., cameras), and sensor devices. Reviewing physical access logs can help identify suspicious activity, anomalous events, or potential threats.

The reviews can be supported by audit logging controls, such as AU-2, if the access logs are part of an automated system. Organizational incident response capabilities include investigations of physical security incidents and responses to the incidents. Incidents include security violations or suspicious physical access activities.

Suspicious physical access activities include accesses outside of normal work hours, repeated accesses to areas not normally accessed, accesses for unusual lengths of time, and out-of-sequence accesses.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.