PE-03 Physical Access Control

a. Enforce physical access authorizations at pe-03_odp.01 by:

1. Verifying individual access authorizations before granting access to the facility; and

2. Controlling ingress and egress to the facility using pe-03_odp.02;

b. Maintain physical access audit logs for pe-03_odp.04;

c. Control access to areas within the facility designated as publicly accessible by implementing the following controls: pe-03_odp.05;

d. Escort visitors and control visitor activity pe-03_odp.06;

e. Secure keys, combinations, and other physical access devices;

f. Inventory pe-03_odp.07 every pe-03_odp.08 ; and

g. Change combinations and keys pe-3_prm_9 and/or when keys are lost, combinations are compromised, or when individuals possessing the keys or combinations are transferred or terminated.

Parameter ID Definition
pe-3_prm_9 organization-defined frequency
pe-03_odp.01 entry and exit points
pe-03_odp.02

Selection (one-or-more):

  • {{ insert: param
  • pe-03_odp.03 }}
  • guards
pe-03_odp.03 systems or devices
pe-03_odp.04 entry or exit points
pe-03_odp.05 physical access controls
pe-03_odp.06 circumstances
pe-03_odp.07 physical access devices
pe-03_odp.08 frequency
pe-03_odp.09 frequency
pe-03_odp.10 frequency

Baselines

Guidance

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas may include physical access control logs/records, guards, or physical access devices and barriers to prevent movement from publicly accessible areas to non-public areas. Organizations determine the types of guards needed, including professional security staff, system users, or administrative staff. Physical access devices include keys, locks, combinations, biometric readers, and card readers. Physical access control systems comply with applicable laws, executive orders, directives, policies, regulations, standards, and guidelines. Organizations have flexibility in the types of audit logs employed. Audit logs can be procedural, automated, or some combination thereof. Physical access points can include facility access points, interior access points to systems that require supplemental access controls, or both. Components of systems may be in areas designated as publicly accessible with organizations controlling access to the components.

References 5

Control Enhancements 8

Related controls 23