UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Server systems must be located in a controlled access area, accessible only to authorized personnel.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1070 WN12-00-000001 SV-52838r1_rule Medium
Description
Inadequate physical protection can undermine all other security precautions utilized to protect the system. This can jeopardize the confidentiality, availability, and integrity of the system. Physical security is the first line of protection of any system.
STIG Date
Windows Server 2012/2012 R2 Member Server Security Technical Implementation Guide 2018-03-07

Details

Check Text ( C-47155r1_chk )
Verify servers are located in controlled access areas that are accessible only to authorized personnel. If systems are not adequately protected, this is a finding.
Fix Text (F-45764r1_fix)
Ensure servers are located in secure, access-controlled areas.