Under active development Content is continuously updated and improved

PE-6Monitoring Physical Access

>Control Description

Individuals who physically access the enterprise or external service provider’s facilities, data centers, information, or physical asset(s) – including via the supply chain – may be employed by the enterprise’s employees, on-site or remotely located contractors, visitors, other third parties (e.g., maintenance personnel under contract with the contractor enterprise), or an individual affiliated with an enterprise in the upstream supply chain. The enterprise should monitor these individuals’ activities to reduce cybersecurity risks throughout the supply chain or require monitoring in agreements.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.