PE-2: Physical Access Authorizations

CSF v1.1 References:

PF v1.0 References:

Threats Addressed:

Baselines:

  • Low
    • PE-2
  • Moderate
    • PE-2
  • High
    • PE-2

Next Version:

Control Statement

The organization:

  1. Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;
  2. Issues authorization credentials for facility access;
  3. Reviews the access list detailing authorized facility access by individuals [Assignment: organization-defined frequency]; and
  4. Removes individuals from the facility access list when access is no longer required.

Supplemental Guidance

This control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. Authorization credentials include, for example, badges, identification cards, and smart cards. Organizations determine the strength of authorization credentials needed (including level of forge-proof badges, smart cards, or identification cards) consistent with federal standards, policies, and procedures. This control only applies to areas within facilities that have not been designated as publicly accessible.

Control Enhancements

PE-2(1): Access By Position / Role

Baseline(s):

(Not part of any baseline)

The organization authorizes physical access to the facility where the information system resides based on position or role.

PE-2(2): Two Forms Of Identification

Baseline(s):

(Not part of any baseline)

The organization requires two forms of identification from [Assignment: organization-defined list of acceptable forms of identification] for visitor access to the facility where the information system resides.

PE-2(3): Restrict Unescorted Access

Baseline(s):

(Not part of any baseline)

The organization restricts unescorted access to the facility where the information system resides to personnel with [Selection (one or more): security clearances for all information contained within the system; formal access authorizations for all information contained within the system; need for access to all information contained within the system; [Assignment: organization-defined credentials]].