🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Conduct Physical Security Risk Assessments and Remediation Plans for Information and Technology Assets — Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-14-3

Step-by-step guidance to assess physical security risks to information and technology assets and build a documented remediation plan to meet ECC 2‑14‑3 compliance requirements.

April 03, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a practical, step‑by‑step approach to satisfy Essential Cybersecurity Controls (ECC – 2 : 2024) Control 2‑14‑3: performing physical security risk assessments for information and IT assets and producing prioritized remediation plans — including concrete examples, technical checks, compliance evidence, and small‑business scenarios.

What Control 2-14-3 expects (Compliance Framework context)

At its core, Control 2‑14‑3 requires organizations to identify the physical threats and vulnerabilities affecting information and IT assets, assess resulting risks, and document remediation plans that assign owners, timelines, and verification steps. For the Compliance Framework this means: scope definition, an asset inventory tied to classification, an evidence-backed risk register, and an auditable remediation plan. Evidence artifacts commonly accepted in audits include the risk register, photos of controls, access control logs, CCTV export snippets, work orders, and proof of remediation (purchase orders, configuration snapshots, or post‑install photos).

Step 1 — Scope and asset inventory (do this first)

Begin by listing every information and technology asset with a physical footprint: servers, network closets, workstations, POS terminals, mobile devices, network distribution frames, backup media, and OT/ICS equipment. Use a simple CSV or your CMDB fields: asset ID, owner, location (room and geo coordinates if distributed), classification (public/confidential/highly confidential), physical sensitivity (locked, open area, public access), and business impact (downtime hours, data sensitivity). For small businesses, an inventory of 50–200 items in a spreadsheet is acceptable if it contains the required fields and is dated/controlled.

Step 2 — Threat and vulnerability analysis, with technical checks

For each asset, assess threats (theft, tampering, environmental, unauthorized access) and vulnerabilities (unlocked closets, absent alarms, exposed cabling). Conduct a physical inspection checklist: verify locks (cylinder grade or electronic escutcheon), check access control integration (badge readers, Wiegand/OSDP wiring), inspect CCTV—camera models/quality (4MP recommended for face recognition), field of view, PoE switch capacity (802.3af/at), and retention (e.g., 90 days for critical areas). Check environmental controls: UPS runtime (minutes at load), HVAC temperature thresholds, humidity sensors, and fire suppression type (inert gas or FM‑200 vs water sprinkler risk for electronics). Log findings in the risk register with supporting photos and device serial numbers.

Risk scoring and prioritization

Score each finding using a simple Likelihood x Impact matrix (1–5 each) or a quantitative model (annualized loss expectancy). For example, an unlocked server closet in a retail store with public foot traffic might be Likelihood=4 (probable) and Impact=5 (critical customer PII), giving a high priority for remediation. Define SLAs: high risks remediated within 30 days, medium within 90, low within 180. Capture compensating controls (e.g., camera coverage) while the primary remediation (installing a badge reader and metal lock) is scheduled.

Remediation planning — template and technical remediation actions

Create a remediation plan entry per risk containing: asset ID, description of risk, recommended remediation, owner, priority, estimated cost, target completion date, verification steps, and evidence required. Typical remediation actions include: installing an electronic access control reader (OSDP recommended for security), upgrading CCTV to 4MP PoE cameras on a VLAN with NVR backup and 90‑day retention, installing encrypted self‑encrypting drives (AES‑256) or enabling BitLocker with TPM+PIN on laptops stored on site, adding a rated server cabinet (18–22U) with a tamper alarm, deploying a monitored intrusion alarm with remote notification, and providing UPS redundancy (N+1 or battery runtime to allow a graceful shutdown). Use work orders and change requests as evidence of remediation implementation.

Small‑business examples and scenarios

Example 1 — Small law firm: servers in a closet accessible from the office corridor. Remediation: move servers to a lockable 24U cabinet, add a badge reader on the closet door integrated with the office directory, enable BitLocker on backup drives, and configure CCTV covering the closet door with 30‑day retention. Evidence: purchase invoice for cabinet, access control event logs showing allowed/denied entries, and a before/after photo.

Example 2 — Retail shop with POS terminals: POS devices sit near an open register. Remediation: anchor POS terminals with cable locks, enable POS application whitelisting, store nightly backups in a locked safe, and schedule CCTV angle adjustment so each POS is visible. Evidence: anchor invoices, CCTV snapshot correlated to an access log, and daily backup logs.

Compliance tips, metrics, and audit evidence

Maintain artifacts and metrics: % of assets assessed, % of high risks remediated within SLA, average time to remediate (MTTR), and results of periodic physical walkthroughs. Evidence should include the risk register, dated photos, access control exports (CSV/PDF) showing events, CCTV clip timestamps, change control records, procurement documents, and signed owner acceptance that mitigation is completed. Schedule reassessments annually and after any facility change — auditors expect repeatable processes with versioned documents and evidence of ongoing monitoring (e.g., quarterly spot checks and an annual full audit).

Risks of not implementing Control 2-14-3

Failure to perform physical security risk assessments and remediation opens organizations to theft of devices and data, deliberate tampering with equipment (leading to malware placement or network pivot), environmental failures (overheating, fire, water damage), business interruption, regulatory fines, and reputational harm. Small businesses are particularly vulnerable because a single unlocked closet or unmonitored server can result in a full customer data breach or ransomware incident that could be business‑ending.

In summary, Control 2‑14‑3 is practical and achievable: start with an accurate asset inventory, perform targeted physical inspections and technical checks, score and prioritize risks, and publish a documented remediation plan with owners, deadlines, and verification. For small businesses, low‑cost mitigations (locks, camera repositioning, basic access control) coupled with clear documentation and periodic reassessment will meet Compliance Framework expectations and materially reduce the likelihood and impact of physical security incidents.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes