PE-6: Monitoring Physical Access
From NIST's SP800-53:
a. Monitor physical access to the facility where the system resides to detect and respond to physical security incidents; b. Review physical access logs [Assignment: organization-defined frequency] and upon occurrence of [Assignment: organization-defined events or potential indications of events]; and c. Coordinate results of reviews and investigations with the organizational incident response capability.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
SP800-53 Control Mapped to NIST Cyber Security Framework
Generated from NISTs SP800-53/CSF Crosswalk mappings.
Control ID | Description |
---|---|
RS.AN-1 | Notifications from detection systems are investigated |
DE.CM-2 | The physical environment is monitored to detect potential cybersecurity events |
DE.CM-7 | Monitoring for unauthorized personnel, connections, devices, and software is performed |
PR.AC-2 | Physical access to assets is managed and protected |
RS.CO-3 | Information is shared consistent with response plans |