Physical security perimeters should be restricted to authorized personnel only. They may include (but are not limited to): fences, walls, barriers, guards, gates, external boundary protection, bollards, fencing, guard dogs, armed guards, physical authentication mechanisms, reception desks, and security patrols.
Implement physical security perimeters to safeguard personnel, data, and information systems. Establish physical security perimeters between the administrative and business areas and the data storage and processing facilities areas.
Physical security perimeters should be restricted to authorized personnel only. They may include (but are not limited to): fences, walls, barriers, guards, gates, external boundary protection, bollards, fencing, guard dogs, armed guards, physical authentication mechanisms, reception desks, and security patrols.
Implement physical security perimeters to safeguard personnel, data, and information systems. Establish physical security perimeters between the administrative and business areas and the data storage and processing facilities areas.