manage.get.gov/docs/compliance/dist/system-security-plans/ato/pe-6.md
Logan McDonald 8d493d2e44
Document things cloud.gov CRM fully supports (#122)
* document things cloud.gov crm fully supports

* run make assemble
2022-10-13 10:36:44 -04:00

2.6 KiB

implementation-status control-origination
c-implemented
c-inherited-cloud-gov

pe-6 - [catalog] Monitoring Physical Access

Control Statement

  • [a] Monitor physical access to the facility where the system resides to detect and respond to physical security incidents;

  • [b] Review physical access logs frequency and upon occurrence of events ; and

  • [c] Coordinate results of reviews and investigations with the organizational incident response capability.

Control guidance

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i.e., cameras), and sensor devices. Reviewing physical access logs can help identify suspicious activity, anomalous events, or potential threats. The reviews can be supported by audit logging controls, such as AU-2 , if the access logs are part of an automated system. Organizational incident response capabilities include investigations of physical security incidents and responses to the incidents. Incidents include security violations or suspicious physical access activities. Suspicious physical access activities include accesses outside of normal work hours, repeated accesses to areas not normally accessed, accesses for unusual lengths of time, and out-of-sequence accesses.

Control assessment-objective

physical access to the facility where the system resides is monitored to detect and respond to physical security incidents; physical access logs are reviewed frequency; physical access logs are reviewed upon occurrence of events; results of reviews are coordinated with organizational incident response capabilities; results of investigations are coordinated with organizational incident response capabilities.


What is the solution and how is it implemented?


Implementation a.

Customer applications fully inherit this control from cloud.gov.


Implementation b.

Customer applications fully inherit this control from cloud.gov.


Implementation c.

Customer applications fully inherit this control from cloud.gov.