3.10 — Physical Protection

Physical Protection (PE) Policy

Establishes requirements for limiting physical access, protecting and monitoring the physical facility and infrastructure — covering 6 controls per NIST SP 800-171 Rev 2.

Family: 3.10 — PEControls: 6Owner: Sandra O. FloydLast Review: April 3, 2026
SELF-ASSESSMENT

Control statuses below reflect an internal self-assessment prepared with AI assistance. Statuses marked "Implemented" may be organizational claims without verifiable evidence. See POA&M for known gaps.

Policy Statement

OCSI shall limit physical access to organizational systems, equipment, and the respective operating environments. Physical access to facilities shall be controlled, monitored, and protected against unauthorized access.

Control Implementation
ControlRequirementImplementationStatus
3.10.1Limit physical access to organizational systems, equipment, and the respective operating environments to authorized individualsOffice facility secured with keyed entry. Authorized personnel list maintained. Visitor access requires escort by authorized person. Server hosting managed by GoDaddy with data center physical security (SOC 2 Type II certified). Implemented
3.10.2Protect and monitor the physical facility and support infrastructure for organizational systemsOffice facility protected with commercial alarm system. Workstations used for CUI access located in private office areas. GoDaddy data centers provide 24/7 physical monitoring, environmental controls, and redundant power. Implemented
3.10.3Escort visitors and monitor visitor activityAll visitors signed in at reception. Visitors escorted at all times in areas where CUI may be visible. Visitor log maintained with name, purpose, date/time in and out. Visitor badges issued and collected upon departure. Implemented
3.10.4Maintain audit logs of physical accessPhysical access log maintained at facility entry. Electronic alarm system records entry/exit events with timestamps. Visitor log archived for minimum 3 years. Logs reviewed monthly by Security Officer. Implemented
3.10.5Control and manage physical access devicesFacility keys issued only to authorized personnel. Key inventory maintained by office administrator. Lost or stolen keys result in immediate lock replacement. Key distribution tracked in access log. Implemented
3.10.6Enforce safeguarding measures for CUI at alternate work sitesRemote work policy requires: (1) private workspace with screen not visible to unauthorized persons, (2) VPN or encrypted connection, (3) device auto-lock after 5 minutes of inactivity, (4) no CUI access on shared or public devices. Remote work security acknowledgment required annually. Implemented
Hosting Infrastructure
ComponentProviderPhysical Security
Web HostingGoDaddy (Shared Hosting)SOC 2 Type II certified data centers, 24/7 monitoring, biometric access, environmental controls
DNSGoDaddy DNSManaged infrastructure
CDN ResourcesGoogle Fonts, FontAwesome (cdnjs)Google/Cloudflare infrastructure
Review Schedule: Physical protection policy reviewed annually. Physical access logs reviewed monthly by Security Officer.