Any physical access to servers and network components is registered

Logging people’s entering/leaving of rooms or technical areas makes those involved accountable and facilitates a retrospective analysis of people's movements.

The history of people entering/leaving sensitive areas allows operations to be traced back to individuals and suspicious movements to be detected. This information can also be used to answer auditors' questions.