1. Home
  2. Frameworks and Standards
  3. DoD 8500
  4. DoD 8500 – PEVC-1 – Visitor Control to Computing Facilities

DoD 8500 – PEVC-1 – Visitor Control to Computing Facilities

Overview

Current signed procedures exist for controlling visitor access and maintaining a detailed log of all visitors to the computing facility.

Threat

Facility is at risk of unauthorized access if controlled visitor access is not maintained.

Guidance

1. Current signed procedures shall be in place for controlling visitor access.
2. Current signed procedures shall be in place for maintaining a detailed log of all visitors to the computing facility.
3. Visitor log shall be archived in a secure area for a set amount of time as established by security operating procedures.

DoD classifies this control in the subject area of “Physical and Environmental” with a impact of “High”.

Reference(s)

Updated on July 16, 2022
Was this article helpful?

Related Articles