PE-5: Access Control For Output Devices

CSF v1.1 References:

PF v1.0 References:

Threats Addressed:

Baselines:

  • Low

    N/A

  • Moderate
    • PE-5
  • High
    • PE-5

Next Version:

Control Statement

The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output.

Supplemental Guidance

Controlling physical access to output devices includes, for example, placing output devices in locked rooms or other secured areas and allowing access to authorized individuals only, and placing output devices in locations that can be monitored by organizational personnel. Monitors, printers, copiers, scanners, facsimile machines, and audio devices are examples of information system output devices.

Control Enhancements

PE-5(1): Access To Output By Authorized Individuals

Baseline(s):

(Not part of any baseline)

The organization: Controls physical access to output from [Assignment: organization-defined output devices]; and Ensures that only authorized individuals receive output from the device.

PE-5(2): Access To Output By Individual Identity

Baseline(s):

(Not part of any baseline)

The information system: Controls physical access to output from [Assignment: organization-defined output devices]; and Links individual identity to receipt of the output from the device.

PE-5(3): Marking Output Devices

Baseline(s):

(Not part of any baseline)

The organization marks [Assignment: organization-defined information system output devices] indicating the appropriate security marking of the information permitted to be output from the device.