Securing Protected Data Environments
- Limiting access to areas containing devices and data with locks
- Keeping a record of who is accessing the environment
- Track access devices such as keys or cards
- Escorting and monitoring visitors
- Keep devices, screens, and keyboards out of sight were possible
- Secure devices when not in use – behind locks, hidden from sight