Only authorized personnel with a need-to-know are granted physical access to computing facilities that process sensitive information or unclassified information that has not been cleared for release.
MAC / CONF | Impact | Subject Area |
---|---|---|
SENSITIVE | High | Physical and Environmental |
Threat |
---|
Servers, workstations and documentation located in secure facilities are at risk of attack, copying, destruction, and illegal distribution by unauthorized access. |
Guidance |
---|
1. All locations where servers, workstations and documentation containing sensitive information shall be prohibited to those who do not have adequate permissions to enter such facilities. 2. Access to these facilities shall be granted to those personnel only after receiving a background investigation, granted approval for access and need-to-know permissions to sensitive information or unclassified information that has not been cleared for release. |