Physical access control mechanisms exist to generate a log entry for each access through controlled ingress and egress points.
Does the organization generate a log entry for each access through controlled ingress and egress points?
Physical access control mechanisms exist to generate a log entry for each access through controlled ingress and egress points.
Does the organization generate a log entry for each access through controlled ingress and egress points?