Identify security measures taken against physical threats to network systems.

Identification should include

  • locks
  • mantraps
  • security cameras
  • policies
  • badging.