The physical environment of the facility shall be monitored for potential information/cybersecurity events.
The physical access to organization's critical systems and devices shall be, on top of the physical access monitoring to the facility, increased through physical intrusion alarms, surveillance equipment, independent surveillance teams.