PE-06 Monitoring Physical Access

Physical and Environmental Protection

Low Moderate High

Description

The organization monitors physical access to the information system to detect and respond to physical security incidents.

Supplemental Guidance

The organization reviews physical access logs periodically and investigates apparent security violations or suspicious physical access activities. Response to detected physical security incidents is part of the organization’s incident response capability.

Compliance Mappings

ISO 27001:2022

A.7.2A.7.4

ISO 27002:2022

7.27.4

COBIT 2019

DSS01DSS05

NIST CSF 2.0

DE.CM-02PR.AA-06

PCI DSS v4.0.1

9.2

CSA CCM v4

DCS-07DCS-10DCS-11

CSA AICM v1

DCS-07DCS-10DCS-11

BSI IT-Grundschutz

INF.1INF.2

ANSSI

Hygiene.37Hygiene.39SecNumCloud.12.2

FINMA Circular 2023/1

IV.C(66)

OSFI B-13

B-13.3.2B-13.3.3

EU GDPR

Art.32(1)(b)Art.32(1)(d)

BIO2

7.27.4

RBI CSF

Annex1.3ITGRCA.18

FISC Security Guidelines

FISC.F1

HKMA TM-E-1

TME1.11.1TME1.11.3TME1.5.1

MLPS 2.0

8.1.1.28.1.1.38.1.10.1

DNB Good Practice

DNB.21.1DNB.21.2

SWIFT CSCF

SWIFT.3.1

SAMA CSF

3.7

NCA ECC

1-11

UAE IA

T6

CBB TM

TM-10

Qatar NIA

PS

CBE CSF

CD-1CTO-10

SA JS2

JS2-PE

CBN CSF

Part10

BoG CISD

CISD-XIV

BoM CTRM

3.5

IOSCO Cyber Resilience

PROT-5

CPMI-IOSCO PFMI

CG.PR

FFIEC IS

II.C.8

HIPAA Security Rule

§164.310(a)(1)§164.310(a)(2)(ii)§164.310(a)(2)(iii)

ECB CROE

CROE.2.3.6

EBA ICT Guidelines

3.4.3

SEBI CSCRF

PR.PE

BOT Cyber Resilience

Ch2.8

CMMC 2.0

PE

NERC CIP

CIP-006-6CIP-014-3

10 CFR 73.54

RG5.71-B-PE

API 1164

Sec 14

IAEA NSS 17-T

Sec 10

PCI PTS v6

AI

FIPS 140-3

FIPS 140-3 §7.7

PCI HSM

67

ISAE 3402

Clause 4

Solvency II

EIOPA-ICT-4.5

Lloyd's Minimum Standards

PHYS.1

NAIC Insurance Data Security

4B

HITRUST CSF v11

08.a

ISO 27799

11.1

CCSS v9.0

1.01.1

Basel SCO60

SCO60.62

BSSC Standards

NOS-09

SEC Custody (Digital Assets)

SEC-CD-08SEC-CD-16

ISO 17799 (legacy)

9.1.2

COBIT 4.1 (legacy)

DS12.3