PE-2: Physical Access Authorizations

CSF v1.1 References:

CSF v2.0 References:

PF v1.0 References:

Threats Addressed:

Baselines:

  • Low
    • PE-2
  • Moderate
    • PE-2
  • High
    • PE-2
  • Privacy

    N/A

Previous Version:

Control Statement

  1. Develop, approve, and maintain a list of individuals with authorized access to the facility where the system resides;
  2. Issue authorization credentials for facility access;
  3. Review the access list detailing authorized facility access by individuals [Assignment: organization-defined frequency]; and
  4. Remove individuals from the facility access list when access is no longer required.

Supplemental Guidance

Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include ID badges, identification cards, and smart cards. Organizations determine the strength of authorization credentials needed consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Physical access authorizations may not be necessary to access certain areas within facilities that are designated as publicly accessible.

Control Enhancements

PE-2(2): Two Forms of Identification

Baseline(s):

(Not part of any baseline)

Require two forms of identification from the following forms of identification for visitor access to the facility where the system resides: [Assignment: organization-defined list of acceptable forms of identification].

PE-2(3): Restrict Unescorted Access

Baseline(s):

(Not part of any baseline)

Restrict unescorted access to the facility where the system resides to personnel with [Assignment (one or more): security clearances for all information contained within the system, formal access authorizations for all information contained within the system, need for access to all information contained within the system, [Assignment: organization-defined physical access authorizations] ].