PE-6—Monitoring Physical Access
>Control Description
Individuals who physically access the enterprise or external service provider’s facilities, data centers, information, or physical asset(s) – including via the supply chain – may be employed by the enterprise’s employees, on-site or remotely located contractors, visitors, other third parties (e.g., maintenance personnel under contract with the contractor enterprise), or an individual affiliated with an enterprise in the upstream supply chain. The enterprise should monitor these individuals’ activities to reduce cybersecurity risks throughout the supply chain or require monitoring in agreements.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.