PE-06 Monitoring Physical Access
Physical and Environmental Protection
Low Moderate High
Description
The organization monitors physical access to the information system to detect and respond to physical security incidents.
Supplemental Guidance
The organization reviews physical access logs periodically and investigates apparent security violations or suspicious physical access activities. Response to detected physical security incidents is part of the organization’s incident response capability.
Compliance Mappings
ISO 27001:2022
A.7.2A.7.4
ISO 27002:2022
7.27.4
COBIT 2019
DSS01DSS05
NIST CSF 2.0
DE.CM-02PR.AA-06
PCI DSS v4.0.1
9.2
CSA CCM v4
DCS-07DCS-10DCS-11
CSA AICM v1
DCS-07DCS-10DCS-11
BSI IT-Grundschutz
INF.1INF.2
ANSSI
Hygiene.37Hygiene.39SecNumCloud.12.2
FINMA Circular 2023/1
IV.C(66)
OSFI B-13
B-13.3.2B-13.3.3
EU GDPR
Art.32(1)(b)Art.32(1)(d)
BIO2
7.27.4
RBI CSF
Annex1.3ITGRCA.18
FISC Security Guidelines
FISC.F1
HKMA TM-E-1
TME1.11.1TME1.11.3TME1.5.1
MLPS 2.0
8.1.1.28.1.1.38.1.10.1
DNB Good Practice
DNB.21.1DNB.21.2
SWIFT CSCF
SWIFT.3.1
SAMA CSF
3.7
NCA ECC
1-11
UAE IA
T6
CBB TM
TM-10
Qatar NIA
PS
CBE CSF
CD-1CTO-10
SA JS2
JS2-PE
CBN CSF
Part10
BoG CISD
CISD-XIV
BoM CTRM
3.5
IOSCO Cyber Resilience
PROT-5
CPMI-IOSCO PFMI
CG.PR
FFIEC IS
II.C.8
HIPAA Security Rule
§164.310(a)(1)§164.310(a)(2)(ii)§164.310(a)(2)(iii)
ECB CROE
CROE.2.3.6
EBA ICT Guidelines
3.4.3
SEBI CSCRF
PR.PE
BOT Cyber Resilience
Ch2.8
CMMC 2.0
PE
NERC CIP
CIP-006-6CIP-014-3
10 CFR 73.54
RG5.71-B-PE
API 1164
Sec 14
IAEA NSS 17-T
Sec 10
PCI PTS v6
AI
FIPS 140-3
FIPS 140-3 §7.7
PCI HSM
67
ISAE 3402
Clause 4
Solvency II
EIOPA-ICT-4.5
Lloyd's Minimum Standards
PHYS.1
NAIC Insurance Data Security
4B
HITRUST CSF v11
08.a
ISO 27799
11.1
CCSS v9.0
1.01.1
Basel SCO60
SCO60.62
BSSC Standards
NOS-09
SEC Custody (Digital Assets)
SEC-CD-08SEC-CD-16
ISO 17799 (legacy)
9.1.2
COBIT 4.1 (legacy)
DS12.3