{"id":1499,"date":"2024-07-24T18:11:43","date_gmt":"2024-07-24T18:11:43","guid":{"rendered":"https:\/\/www.tarleton.edu\/security-controls-catalog\/?page_id=1499"},"modified":"2024-09-05T21:53:26","modified_gmt":"2024-09-05T21:53:26","slug":"pe-4-access-control-for-transmission","status":"publish","type":"page","link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-4-access-control-for-transmission\/","title":{"rendered":"PE-4: Access Control for Transmission"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-large-font-size\">PE-4: Access Control for Transmission<\/h1>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>NIST Baseline: &nbsp;<\/strong>Moderate&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>Not Required by DIR or TAMUS (Discretionary)<\/strong>&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>Review Date: &nbsp;<\/strong>07\/24\/2024&nbsp;<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Information resource custodians who are responsible for Tarleton State University (Tarleton) information resource facilities will ensure that physical access to system distribution and transmission lines is controlled within organizational facilities in accordance with <a href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-2-physical-access-authorizations\/\">Control PE-2, Physical Access Authorizations<\/a>; and <a href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/physical-and-environmental-protection-pe\/pe-3-physical-access-control\/\">Control PE-3, Physical Access Control<\/a>. \u00a0<\/li>\n<\/ol>\n\n\n\n<p><strong>Note: <\/strong>Security controls applied to system distribution and transmission lines prevent accidental damage, disruption, and physical tampering. Such controls may also be necessary to prevent eavesdropping or modification of unencrypted transmissions. Security controls used to control physical access to system distribution and transmission lines include disconnected or locked spare jacks, locked wiring closets, protection of cabling by conduit or cable trays, and wiretapping sensors.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator alignfull has-text-color has-tarleton-purple-color has-alpha-channel-opacity has-tarleton-purple-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>References\/Additional Resources<\/strong><\/h3>\n\n\n\n<p>None.&nbsp; See any applicable internal procedures.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PE-4: Access Control for Transmission NIST Baseline: &nbsp;Moderate&nbsp; Not Required by DIR or TAMUS (Discretionary)&nbsp; Review Date: &nbsp;07\/24\/2024&nbsp; Note: Security controls applied to system distribution and transmission lines prevent accidental &#8230;<\/p>\n","protected":false},"author":1,"featured_media":580,"parent":1528,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-1499","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/author\/brian-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-3\/","display_name":"brian"},"relative_dates":{"created":"Posted 2 years ago","modified":"Updated 2 years ago"},"absolute_dates":{"created":"Posted on July 24, 2024","modified":"Updated on September 5, 2024"},"absolute_dates_time":{"created":"Posted on July 24, 2024 6:11 pm","modified":"Updated on September 5, 2024 9:53 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/comments?post=1499"}],"version-history":[{"count":0,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1499\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1528"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/media?parent=1499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}