• Limit the chances that devices (e.g., laptops, handhelds, desktops, servers, thumb drives, CDs, backup tapes) may be tampered with, lost, or stolen.
• Document and enforce policies limiting physical access to devices and information:
o Keep machines in locked rooms.
o Manage keys to facilities.
o Restrict removal of devices from a secure area.
Assignment status: Solved by our experts