UCF STIG Viewer Logo

PEVC-1 Visitor Control to Computing Facilities


Overview

Current signed procedures exist for controlling visitor access and maintaining a detailed log of all visitors to the computing facility.

MAC / CONF Impact Subject Area
CLASSIFIED
SENSITIVE
High Physical and Environmental

Details

Threat
Facility is at risk of unauthorized access if controlled visitor access is not maintained.

Guidance
1. Current signed procedures shall be in place for controlling visitor access.
2. Current signed procedures shall be in place for maintaining a detailed log of all visitors to the computing facility.
3. Visitor log shall be archived in a secure area for a set amount of time as established by security operating procedures.

References

    N/A