IBM Cloud Docs
PE-3 - Physical Access Control

PE-3 - Physical Access Control

Control requirements

PE-3 (a)

Enforce physical access authorizations at [Assignment: organization-defined entry and exit points to the facility where the system resides] by:

  1. Verifying individual access authorizations before granting access to the facility; and
  2. Controlling ingress and egress to the facility using [IBM Assignment: locks, guards, badge systems, and video cameras].

PE-3 (b)

Maintain physical access audit logs for [Assignment: organization-defined entry or exit points].

PE-3 (c)

Control access to areas within the facility designated as publicly accessible by implementing the following controls: [Assignment: organization-defined physical access controls].

PE-3 (d)

Escort visitors and control visitor activity [IBM Assignment: in all circumstances within restricted access area where the information system resides].

PE-3 (e)

Secure keys, combinations, and other physical access devices.

PE-3 (f)

Inventory [Assignment: organization-defined physical access devices] every [IBM Assignment: at least annually].

PE-3 (g)

Change combinations and keys [IBM Assignment: at least annually] and/or when keys are lost, combinations are compromised, or when individuals possessing the keys or combinations are transferred or terminated.

Additional IBM Cloud for Financial Services specifications

A penetration testing process must be in place that includes unannounced attempts to bypass or circumvent security controls associated with physical access points to the facility.

NIST supplemental guidance

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas may include physical access control logs/records, guards, or physical access devices and barriers to prevent movement from publicly accessible areas to non-public areas. Organizations determine the types of guards needed, including professional security staff, system users, or administrative staff. Physical access devices include keys, locks, combinations, biometric readers, and card readers. Physical access control systems comply with applicable laws, executive orders, directives, policies, regulations, standards, and guidelines. Organizations have flexibility in the types of audit logs employed. Audit logs can be procedural, automated, or some combination thereof. Physical access points can include facility access points, interior access points to systems that require supplemental access controls, or both. Components of systems may be in areas designated as publicly accessible with organizations controlling access to the components.