Controlling Access to Devices Outside the Computer Room

Although access security requirements for items external to the computer room are often less stringent than for devices in the computer room, the procedures described in this section are recommended.