Any physical access to servers and network components is registered

Logging people’s entering/leaving of rooms or technical areas makes those involved accountable and facilitates a retrospective analysis of people's movements.

The history of people entering/leaving sensitive areas allows operations to be individualised and suspicious movements to be detected. This information can also be used to answer auditors' questions.