Any physical access to servers and network components is registered
Logging people’s entering/leaving of rooms or technical areas makes those involved accountable and facilitates a retrospective analysis of people's movements.
The history of people entering/leaving sensitive areas allows operations to be traced back to individuals and suspicious movements to be detected. This information can also be used to answer auditors' questions.