Mechanisms exist to maintain proper physical security and configuration control over technology assets awaiting service or repair.
Does the organization maintain proper physical security and configuration control over technology assets awaiting service or repair?