Controlling Access to Devices Outside the Computer Room
Although access security requirements for items external to
the computer room are often less stringent than for devices in the
computer room, the procedures described in this section are recommended.