Physical Access to Facilities and Information Assets
Description
The entity restricts physical access to facilities and protected information assets to authorized personnel, supplementing logical access controls.
⚠️ Risk Impact
Physical access bypasses logical controls. An attacker with physical access to a data center, an office, or even an unattended laptop can extract credentials, plant persistent access, or directly access data — invisible to every IAM and EDR control.
🔍 How EchelonGraph Detects This
EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as medium-severity findings with remediation guidance.
🔧 Remediation
For cloud-first orgs: inherit physical security from the cloud provider's SOC 2 attestation (AWS / GCP / Azure all publish current reports). For office environments: badge access logs, visitor management with sign-in, secure workstation policies, MDM-enforced screen lock. Document.
💀 Real-World Attack Scenario
A late-night contractor accessed an office under tailgating conditions (let in by an employee who didn't verify badge), plugged a USB Rubber Ducky into an unlocked workstation, and exfiltrated AWS credentials cached locally. The breach was detected only when AWS billing flagged anomalous compute consumption two weeks later. Physical access bypassed every other control.
💰 Cost of Non-Compliance
Physical-access breach: average $4.2M (IBM 2024) — typically lower frequency than network attacks but higher per-incident cost because traditional defenses don't apply. SOC 2 audit findings on physical controls cited in 19% of qualified opinions when cloud-only orgs forget the office portion.
📋 Audit Questions
- 1.Show the AWS / GCP / Azure SOC 2 attestation report covering data-center physical security.
- 2.What badge access controls protect your office? Show the visitor log.
- 3.What is the MDM policy for laptop screen-lock + full-disk encryption?
- 4.When was the last physical-security walkthrough?
🎯 MITRE ATT&CK Mapping
⚡ Common Pitfalls
- ⛔Cloud-only orgs forgetting that office, co-working, and home-office environments are still in scope
- ⛔Inheriting cloud provider physical attestation but not documenting it as evidence in your SOC 2 package
- ⛔Allowing tailgating culture ('hold the door for me, I forgot my badge') that defeats every technical badge control
📈 Business Value
Documented physical security closes a category of attack that bypasses every other security investment. The cost is low; the audit-defensibility is high.
⏱️ Effort Estimate
8-16 hours for facility walkthrough + policy documentation + cloud provider attestation collection
EchelonGraph evaluates cloud-provider attestation freshness and policy gaps
🔗 Cross-Framework References
Automate SOC 2 CC6.4 compliance
EchelonGraph continuously monitors this control across all your cloud accounts.
Start Free →