This episode covers an msp employees role CMMC compliance with practical tips for understanding controls in the Physical security domain. From managing visitor logs to addressing physical threats like theft, we examine the human element in security. Finally, we provide MSP employees with actionable guidance to bridge physical and digital security effectively.
Lila Trevors
Alright, letâs jump into it! The Physical Protection Domain. A single propped-open door. A missing visitor log. A forgotten badge. Sounds small, right? But these little gaps could cost us or our clients their CMMC Level 2 complianceâand more.
Eric Marquette
Thatâs right! Physical security isnât just about locked doorsâitâs about when you step away. Weâre breaking down the âletâs get into it!
Lila Trevors
Right, Eric, we were just talking about how all these cybersecurity controls tie into the physical side of things. Like, whatâs the point of securing data digitally if someone can just walk into your office and snoop around?
Eric Marquette
Exactly. Physical security is one of those things that people often overlook, thinking it's not a "cyber" problem, but it's all connected. If someone gains physical access to your equipment, they could bypass a lot of those digital protections we've talked about.
Lila Trevors
Right, I mean, picture thisâsomeone walks in, plugs a USB drive into your server, and boom! Theyâve just bypassed all your cybersecurity layers. Itâs like setting up a fancy alarm system at home but leaving the front door wide open.
Eric Marquette
That's a great analogy. Letâs break it downâphysical security covers things like securing access points, logging who comes and goes, and making sure visitors donât just wander around unescorted.
Lila Trevors
Oh, visitor logs! Can we talk about that for a second? It sounds so basic, but Iâve seen companies overlook this completely. They figure, âOh, weâre small, we donât need that,â but then they forget whoâs been in their space.
Eric Marquette
Exactly. And itâs not just about keeping a list of namesâitâs about connecting those logs back to your policies. For instance, are visitors being escorted? Do they have access to areas with sensitive info, like CUI?
Lila Trevors
Oh my gosh, Iâve got a story for you. I heard about this company where the office manager left, and no one took over maintaining the visitor logs. A year later, they couldnât figure out who had accessed an area during a security incident.
Eric Marquette
Oof, yeah, thatâs not a great place to be. Those gaps can lead to major compliance issues, not to mention the potential for real security breaches. And letâs not forget about simple things like locking down equipment and documents, too.
Lila Trevors
Totally. Itâs all part of a bigger puzzleâconnecting physical security measures to your overall compliance framework. Like, it's not just about locks and logs; itâs about making sure everything works together to protect your data, your team, everything.
Lila Trevors
So, weâve laid out why physical security is so critical, especially with those real-world examples we just discussed. Now let's zoom in on what MSP employeesâyes, Iâm talking to you listeningâcan concretely do about it under CMMC Level 2. Eric, why donât we kick this off with the top five practical steps they should focus on?
Eric Marquette
Sure thing. First up, secure those access points. That means no unauthorized entry, not just for people but for your equipment too. Itâs step zeroâlock those doors, secure the server rooms.
Lila Trevors
And donât forget, youâre not just protecting what's inside the building. Itâs about the data and systems, too. Whatâs next?
Eric Marquette
Second, escort and log all visitors. Itâs not just a formalityâit ties back to compliance. You need a record of whoâs in your space, why theyâre there, and good escorting policies to ensure theyâre not poking around where they shouldnât.
Lila Trevors
Oh, and logs can be digital or physical, right? So, thereâs no excuse. Next?
Eric Marquette
Number threeâmaintain access records and review them regularly. Donât let them just sit in a filing cabinet or, worse, an ignored spreadsheet. If you donât use the data, itâs useless.
Lila Trevors
Right, and letâs not forget a big oneâlocking down workstations and securing documents. If youâre leaving stuff on your desk at the end of the day, youâre doing it wrong. You lock your house, donât you?
Eric Marquette
Exactly. And finally, number fiveâreport anything suspicious immediately. Lost badges? Someone wandering where they shouldnât be? Donât assume someone else will handle it. Speak up!
Lila Trevors
Okay, real quick, letâs do a âWhat would you doâ scenario. Picture this: Youâre at the office late, and you see someone who doesnât belong there walk past you, heading toward the server room. Whatâs your first move?
Eric Marquette
Iâd say, first things firstâdonât confront them directly unless youâre certain theyâre supposed to be there. Alert security or your manager right away. Suspicious activity reporting is critical here, and policies exist to guide you through it.
Lila Trevors
Exactly! Follow the protocol, people. Even small actions like this make a huge difference in protecting your organization. Alright, letâs quickly recap.
Eric Marquette
So, to recapâsecure access points, escort and log visitors, maintain and review access records, lock down workstations and documents, and report suspicious activity immediately. These arenât just good habits; theyâre essential for compliance and security.
Eric Marquette
Next lets dive deeper into some of the acronyms you should be familiar with if your talking about this domain
Lila Trevors
Good call! First up a pop quiz! What is CUI?
Eric Marquette
Thatâs , which is sensitive government-related data we must protect both physically and digitally."
Eric Marquette
Next up FCI what is that?
Eric Marquette
. Itâs not as sensitive as CUI, but still requires protection from unauthorized access.
Eric Marquette
Now for the New ones right?
Lila Trevors
Yes, since weâre talking physical security, youâll hear PACSâ. Thatâs everything from ."
Eric Marquette
"Exactly! Oh, and letâs not forget BMSâ. It controls things like security cameras and even door access, which means it can be a cybersecurity risk if not properly managed."
Eric Marquette
So if you remember anything, focus on âbecause they directly impact how we secure our workspaces.
Lila Trevors
You know, one more crucial topic we need to cover: what role do we, as an MSP, play in this for our clients?
Eric Marquette
Lila Trevors
And thatâs it for today, folks! Remember, all of us at The IT Company are on the front lines of this. Every small action counts. Thanks for hanging out with us, and weâll catch you next time!
Eric Marquette
Yep, stay vigilant, stay compliant, and, uhâdonât forget to log your visitors! See you next time.
Chapters (3)
About the podcast
Join The IT Company on our CMMC General Education Journey, where we break down the Cybersecurity Maturity Model Certification (CMMC) in a way thatâs accessible, practical, and relevant for businesses and IT professionals. Whether you're just starting to understand CMMC compliance or looking for strategies to level up your security posture, this podcast provides insights from industry experts, MSPs, and cybersecurity professionals navigating the same challenges
This podcast is brought to you by Jellypod, Inc.
© 2025 All rights reserved.