PE-5 (2)
PE-5 (2): Access To Output By Individual Identity
The information system:
- PE-5 (2)(a): Controls physical access to output from [Assignment: organization-defined output devices]; and
- PE-5 (2)(b): Links individual identity to receipt of the output from the device.
Supplemental
Controlling physical access to selected output devices includes, for example, installing security functionality on printers, copiers, and facsimile machines that allows organizations to implement authentication (e.g., using a PIN or hardware token) on output devices prior to the release of output to individuals.
CIA Levels | |
---|---|
Confidentiality | unknown |
Integrity | unknown |
Availability | unknown |
Overlays |
---|
None |