Under active development Content is continuously updated and improved

PE-3Physical Access Control

PBMM (P1)
Secret (P1)
Operational

>Control Description

(A) The organization enforces physical access authorizations at organization-defined entry/exit points to the facility where the information system resides by: (a) Verifying individual access authorizations before granting access to the facility; and (b) Controlling ingress/egress to the facility using [Selection (one or more): organization-defined physical access control systems/devices; guards]; (B) The organization maintains physical access audit logs for organization-defined entry/exit points. (C) The organization provides organization-defined security safeguards to control access to areas within the facility officially designated as publicly accessible. (D) The organization escorts visitors and monitors visitor activity organization-defined circumstances requiring visitor escorts and monitoring. (E) The organization secures keys, combinations, and other physical access devices. (F) The organization inventories organization-defined physical access devices every organization-defined frequency. (G) The organization changes combinations and keys organization-defined frequency and/or when keys are lost, combinations are compromised, or individuals are transferred or terminated.

>Supplemental Guidance

Control of access to restricted-access areas and other organizational space is to be provided in a manner which does not contravene the life safety requirements of the 2010 National Building Code (NBC) [Reference 19], 2010 National Fire Code (NFC) [Reference 20] and related codes, standards and guidelines. Refer to RCMP G1-010, Security Connotations of the 1995 National Building Code [Reference 21] for more informationThis control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors.

Organizations determine the types of facility guards needed including, for example, professional physical security staff or other personnel such as administrative staff or information system users. Physical access devices include, for example, keys, locks, combinations, and card readers. Safeguards for publicly accessible areas within organizational facilities include, for example, cameras, monitoring by guards, and isolating selected information systems and/or system components in secured areas.

Physical access control systems comply with applicable GC legislation and TBS policies, directives, and standards. Organizations have flexibility in the types of audit logs employed. Audit logs can be procedural (e.g., a written log of individuals accessing the facility and when such access occurred), automated (e.g., capturing ID provided by a PIV card), or some combination thereof.

Physical access points can include facility access points, interior access points to information systems and/or components requiring supplemental access controls, or both. Components of organizational information systems (e.g., workstations, terminals) may be located in areas designated as publicly accessible with organizations safeguarding access to such devices. Related controls: AU-2, AU-6, MP-2, MP-4, PE-2, PE-4, PE-5, PS-3, RA-3.

>Profile-Specific Parameters

(F) Inventories of physical devices [annually] (G) Changes combinations and keys [only when keys are lost, combinations are compromised or individuals are transferred or terminated]

Ask AI

Configure your API key to use AI features.