🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PE.L2-3.10.2

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PE.L2-3.10.2

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PE.L2-3.10.2 – Protect and monitor the physical facility and support infrastructure for organizational systems.

Understanding the Requirement

This control (NIST SP 800-171 REV.2 / CMMC 2.0 Level 2) requires that you both limit and observe physical access to the spaces where systems and their supporting infrastructure live. Practically, that means preventing unauthorized entry to server rooms, electrical closets and wiring paths, and ensuring those spaces and devices are monitored so tampering, theft, or accidental disruptions are detected quickly. The objectives include protecting the physical facility and support infrastructure and putting monitoring in place for both to reduce risk to your IT systems and data.

Technical Implementation

  • Lock and control access to critical spaces. Keep server rooms, electrical closets and network cabinets locked with keyed locks, electronic locks, or badge readers. Maintain an access roster with role-based permissions so only authorized staff (IT admins, facility personnel) can enter; review and remove access promptly when roles change.
  • Secure cabling and power paths. Run network and power cables in conduits or ceiling trays where possible; label both ends and bundle cables to avoid accidental unplugging. For small offices, use lockable network cabinets and secure power strips or PDUs inside the cabinet to prevent accidental disruption.
  • Deploy affordable monitoring. Install surveillance cameras covering entrances, server rooms and key infrastructure locations. Use cameras that support motion detection and event retention (30–90 days depending on space and budget). If cameras aren’t feasible everywhere, use door/window sensors and tamper switches on cabinets to provide alerts.
  • Log and review physical access and events. Integrate electronic locks, camera event logs and sensor alerts into a simple logging solution or SIEM if available. Define a schedule for daily or weekly review of access logs and camera snapshots, and escalate suspicious events to designated staff immediately.
  • Protect environmental and power infrastructure. Use UPS units for critical servers and network gear; lock or secure UPS cabinets and switchgear. Maintain basic environmental monitoring (temperature/humidity) and integrate alarms for HVAC or power failures so you can respond before equipment is damaged.
  • Operational controls and testing. Create simple written procedures for visitor escorting, tailgating prevention, and contractor access. Conduct periodic physical inspections and quarterly tests of alarms, camera recording, and access control to ensure systems work and configurations remain current.

Example in a Small or Medium Business

Acme Design Co., a 40-person firm, decides to harden their physical security after a brief outage caused by an accidentally unplugged switch. They install a lockable network cabinet in a small locked IT room and configure an electronic keypad with a code restricted to two IT staff and one facilities manager. Network and power cables into critical devices are routed through a ceiling tray and labeled to reduce accidental pulls during desk moves. Two PoE cameras are placed to cover the main entrance and the IT room doorway; camera footage is retained for 45 days on a local NVR. Door contact sensors are added to the IT room and tied to the company’s alerting system so on-call staff receive text notifications for unexpected openings after hours. Acme documents a visitor escort policy, requires contractors to check in with reception, and reviews access codes and camera logs every month. They also added a small UPS to networking gear and a temperature sensor in the IT room to catch environmental problems early.

Summary

Combining straightforward policies (access rosters, visitor escorting, and review routines) with practical technical controls (locks, secure cabling, cameras, UPS and sensors) meets the requirement to protect and monitor the physical facility and its support infrastructure. For SMBs these measures are scalable and cost-effective: they reduce the chance of accidental outages, detect tampering or intrusions quickly, and create auditable logs to support incident response and compliance efforts.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes