PE-5
PE-5: Access Control For Output Devices
The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output.
Supplemental
Controlling physical access to output devices includes, for example, placing output devices in locked rooms or other secured areas and allowing access to authorized individuals only, and placing output devices in locations that can be monitored by organizational personnel. Monitors, printers, copiers, scanners, facsimile machines, and audio devices are examples of information system output devices.
CIA Levels | |
---|---|
Confidentiality | moderate |
Integrity | unknown |
Availability | unknown |
Overlays |
---|
Int-B, Int-C, Privacy (High), Privacy (Low), Privacy (Mod), Privacy (PHI) |