Examples of Physical Access Control Systems in a sentence
Examples may include, but are not limited to, firewalls, authentication servers, and log monitoring and alerting systems.• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System associated with a referenced high impact BES Cyber System or medium impact BES Cyber System with External Routable Connectivity.• Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset associated with a referenced high impact BES Cyber System or medium impact BES Cyber System.
Examples may include, but are not limited to, firewalls, authentication servers, and log monitoring and alerting systems.• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System associated with a referenced high impact BES Cyber System or medium impact BES Cyber System with External Routable Connectivity.
PACSs are defined in the NERC Glossary of Terms as follows: Physical Access Control Systems (PACSs): “Cyber Assets that control, alert, or log access to the Physical Security Perimeter(s),[35] exclusive of locally mounted hardware or devices at the Physical Security Perimeter such as motion sensors, electronic lock control mechanisms, and badge readers.” The systems that make up PACSs are often used to control and monitor physical access to Facilities and systems on the BES where BES Cyber Systems reside.
Examples may include, but are not limited to, firewalls, authentication servers, and log monitoring and alerting systems.• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System associated with a referenced high impact BES Cyber System or medium impact BES Cyber System with External Routable Connectivity.B. Requirements and Measures R1.
The Program1 provides testing of Enterprise Physical Access Control Systems (E-PACS) for listing on the APL that fully support both Personal Identity Verification (PIV) and PIV Interoperable (PIV-I) credentials.
Government will make available IP ranges and switch ports in identified communication closets for all required peripherals and network connectivity as required to achieve compliance with GSA Evaluation Program for FIPS 201 Enterprise Physical Access Control Systems, E-PACS.
Examplesmay include, but are not limited to, firewalls, authentication servers, and log monitoring and alerting systems.• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System associated with a referenced high impact BES Cyber System or medium impact BES Cyber System with External Routable Connectivity.• Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset associated with a referenced high impact BES Cyber System or medium impact BES Cyber System.
Examples may include, but are not limited to, firewalls, authentication servers, and log monitoring and alerting systems. Physical Access Control Systems (PACS) – Applies to each Physical Access Control System associated with a referenced high impact BES Cyber System or medium impact BES Cyber System with External Routable Connectivity.B. Requirements and Measures R1.
Examples may include, but are not limited to, firewalls, authentication servers, and log monitoring and alerting systems. Physical Access Control Systems (PACS) – Applies to each Physical Access Control System associated with a referenced high impact BES Cyber System or medium impact BES Cyber System with External Routable Connectivity. Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset associated with a referenced high impact BES Cyber System or medium impact BES Cyber System.
Examples may include, but are not limited to, firewalls, authentication servers, and log monitoring and alerting systems.• Physical Access Control Systems (PACS) – Applies to each Physical Access Control System associated with a referenced high impact BES Cyber System or medium impact BES Cyber System.• Protected Cyber Assets (PCA) – Applies to each Protected Cyber Asset associated with a referenced high impact BES Cyber System or medium impact BES Cyber System.