UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Server systems must be located in a controlled access area, accessible only to authorized personnel.


Overview

Finding ID Version Rule ID IA Controls Severity
V-225239 WN12-00-000001 SV-225239r569185_rule Medium
Description
Inadequate physical protection can undermine all other security precautions utilized to protect the system. This can jeopardize the confidentiality, availability, and integrity of the system. Physical security is the first line of protection of any system.
STIG Date
Microsoft Windows Server 2012/2012 R2 Member Server Security Technical Implementation Guide 2020-10-15

Details

Check Text ( C-26938r471059_chk )
Verify servers are located in controlled access areas that are accessible only to authorized personnel. If systems are not adequately protected, this is a finding.
Fix Text (F-26926r471060_fix)
Ensure servers are located in secure, access-controlled areas.