BRACKETOLOGY | FEDRAMP
PE-2: PHYSICAL ACCESS AUTHORIZATIONS
-
FedRAMP Baseline Membership PE-2:
- LOW
- MODERATE
- HIGH
FedRAMP Bracketology
Use the FedRAMP Control Membership information above to determine if a control or control enhancement is required for each Impact Baseline — LOW, MODERATE, or HIGH
Click on the panel below each control or control enhancement to review the FedRAMP Impact Baseline-specific control configuration requirements for each of the [BRACKETS] in each control and/or control enhancement.
Review and use Additional Requirements and Guidance to build FedRAMP-compliant controls for your risk-based cybersecurity program.
To change the baseline view in the panel, click on LOW, MODERATE, or HIGH when the panel is open
Panels only appear where there are [BRACKETS] in the control or enhancement or where there is FedRAMP-specific requirements or guidance available.
The organization:
- a. Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;
- b. Issues authorization credentials for facility access;
- c. Reviews the access list detailing authorized facility access by individuals [Assignment: organization-defined frequency]; and
- d. Removes individuals from the facility access list when access is no longer required.
Click Low | Moderate | High below to see FedRAMP control configuration information. It's in BOLD.
The organization:
- a. Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;
- b. Issues authorization credentials for facility access;
- c. Reviews the access list detailing authorized facility access by individuals at least annually; and
- d. Removes individuals from the facility access list when access is no longer required.
The organization:
- a. Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;
- b. Issues authorization credentials for facility access;
- c. Reviews the access list detailing authorized facility access by individuals at least annually; and
- d. Removes individuals from the facility access list when access is no longer required.
The organization:
- a. Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;
- b. Issues authorization credentials for facility access;
- c. Reviews the access list detailing authorized facility access by individuals at least every ninety (90) days; and
- d. Removes individuals from the facility access list when access is no longer required.
SUPPLEMENTAL GUIDANCE
This control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. Authorization credentials include, for example, badges, identification cards, and smart cards. Organizations determine the strength of authorization credentials needed (including level of forge-proof badges, smart cards, or identification cards) consistent with federal standards, policies, and procedures. This control only applies to areas within facilities that have not been designated as publicly accessible.
RELATED CONTROLS: PE-2
CONTROL ENHANCEMENTS
PE-2 (1) PHYSICAL ACCESS AUTHORIZATIONS | ACCESS BY POSITION / ROLE
The organization authorizes physical access to the facility where the information system resides based on position or role.
Supplemental Guidance: NONE
RELATED CONTROLS: PE-2 (1)
PE-2 (2) PHYSICAL ACCESS AUTHORIZATIONS | TWO FORMS OF IDENTIFICATION
The organization requires two forms of identification from [Assignment: organization-defined list of acceptable forms of identification] for visitor access to the facility where the information system resides.
Supplemental Guidance:
Acceptable forms of government photo identification include, for example, passports, Personal Identity Verification (PIV) cards, and drivers' licenses. In the case of gaining access to facilities using automated mechanisms, organizations may use PIV cards, key cards, PINs, and biometrics.
RELATED CONTROLS: PE-2 (2)
PE-2 (3) PHYSICAL ACCESS AUTHORIZATIONS | RESTRICT UNESCORTED ACCESS
The organization restricts unescorted access to the facility where the information system resides to personnel with [Selection (one or more): security clearances for all information contained within the system; formal access authorizations for all information contained within the system; need for access to all information contained within the system; [Assignment: organization-defined credentials]].
Supplemental Guidance:
Due to the highly sensitive nature of classified information stored within certain facilities, it is important that individuals lacking sufficient security clearances, access approvals, or need to know, be escorted by individuals with appropriate credentials to ensure that such information is not exposed or otherwise compromised.
RELATED CONTROLS: PE-2 (3)
REFERENCES:
- NO REFERENCES