Securing Protected Data Environments

  • Limiting access to areas containing devices and data with locks
  • Keeping a record of who is accessing the environment
  • Track access devices such as keys or cards
  • Escorting and monitoring visitors
  • Keep devices, screens, and keyboards out of sight were possible
  • Secure devices when not in use – behind locks, hidden from sight