Applicable Requirement: PE.L2-3.10.1 — “Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.”
Why D is Correct: Documented procedures describing physical access restrictions (badge policies, visitor management, locked server rooms, guard post orders) serve as primary evidence that access is managed and enforced. Assessors can then corroborate via interviews and observation.
Why Other Options Are Insufficient:
A (VPN configuration): Relates to remote logical access, not physical security.
B (Switch configs): Technical network controls, not physical access.
C (Architecture drawings): Show logical/system design, not physical entry restrictions.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit