CMMC Practice Requirement:

Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.

CMMC Requirement Explanation:

Controlling access to your facilities and devices reduces the likelihood of a security incident. Locked doors and locked containers prevent information from being accessed, stolen or destroyed.

Example CMMC Implementation:

Prevent unauthorized persons from accessing your company's facilities. Prevent unauthorized persons from physically accessing devices used to support DoD projects. This includes workstations, servers, network devices, printers and fax machines. Determine which areas of your facility are non-sensitive (e.g. the lobby). Determine which areas are sensitive. Sensitive areas include your server room and places where your work on DoD contracts. Install smart card readers on doors leading to sensitive areas in your facility. Only provide smart cards to authorized persons. Provide your employees with ID cards to distinguish them from visitors. Limit physical access to your devices. Keep your servers and network devices in a locked room (e.g. server room). Keep hard drives containing “Federal Contract Information” (FCI) or “Controlled Unclassified Information” (CUI) in locked containers. Keep paper work containing “Federal Contract Information” (FCI) or “Controlled Unclassified Information” (CUI) in locked cabinets. Place printers and fax machines that print “Federal Contract Information” (FCI) or “Controlled Unclassified Information” (CUI) in areas that can only be accessed by authorized persons.

Scenario(s):

- Scenario 1:

Jim installs a smart card reader at the entrance of his company's office and at the door to the server room. He provides each employee with a smart card to access the office. He provides authorized members of the IT team access to the server room.
 

Discover Our NIST SP 800-171 Solutions:

 /assets/images/compliance_accelerator_white.png

Compliance Accelerator

For contractors seeking compliance
 /assets/images/quantum_assessor_white.png

Quantum Assessor

For IT service providers
 /assets/images/supply_chain_logo_white.png

Supply Chain Verifier

For contractors seeking to verify partner compliance