CMMC v2.0_PE.L1-3.10.4

CMMC v2.0

3.10 PHYSICAL PROTECTION

PE.L1-3.10.4

Maintain audit logs of physical access.

Organizations have flexibility in the types of audit logs employed. Audit logs can be procedural (e.g. a written log of individuals accessing the facility) automated (e.g. capturing ID provided by a PIV card) or some combination thereof. Physical access points can include facility access points interior access points to systems or system components requiring supplemental access controls or both. System components (e.g. workstations notebook computers) may be in areas designated as publicly accessible with organizations safeguarding access to such devices

 

Click here to Start your FREE trial today!

Explainer video

 

What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video