National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

NIST Special Publication 800-53 (Rev. 4)

Security Controls and Assessment Procedures for Federal Information Systems and Organizations

PE-5 ACCESS CONTROL FOR OUTPUT DEVICES

Family:
PE - PHYSICAL AND ENVIRONMENTAL PROTECTION
Class:
Priority:
P2 - Implement P2 security controls after implementation of P1 controls.
Baseline Allocation:
Low Moderate High
N/A PE-5 PE-5

Control Description

The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output.

Supplemental Guidance

Controlling physical access to output devices includes, for example, placing output devices in locked rooms or other secured areas and allowing access to authorized individuals only, and placing output devices in locations that can be monitored by organizational personnel. Monitors, printers, copiers, scanners, facsimile machines, and audio devices are examples of information system output devices.

Related to: PE-2PE-3PE-4PE-18

Control Enhancements

PE-5(1) ACCESS CONTROL FOR OUTPUT DEVICES | ACCESS TO OUTPUT BY AUTHORIZED INDIVIDUALS
The organization:
PE-5 (1)(a)
Controls physical access to output from [Assignment: organization-defined output devices]; and
PE-5 (1)(b)
Ensures that only authorized individuals receive output from the device.
Supplemental Guidance: Controlling physical access to selected output devices includes, for example, placing printers, copiers, and facsimile machines in controlled areas with keypad access controls or limiting access to individuals with certain types of badges.
PE-5(2) ACCESS CONTROL FOR OUTPUT DEVICES | ACCESS TO OUTPUT BY INDIVIDUAL IDENTITY
The information system:
PE-5 (2)(a)
Controls physical access to output from [Assignment: organization-defined output devices]; and
PE-5 (2)(b)
Links individual identity to receipt of the output from the device.
Supplemental Guidance: Controlling physical access to selected output devices includes, for example, installing security functionality on printers, copiers, and facsimile machines that allows organizations to implement authentication (e.g., using a PIN or hardware token) on output devices prior to the release of output to individuals.
PE-5(3) ACCESS CONTROL FOR OUTPUT DEVICES | MARKING OUTPUT DEVICES
The organization marks [Assignment: organization-defined information system output devices] indicating the appropriate security marking of the information permitted to be output from the device.
Supplemental Guidance: Outputs devices include, for example, printers, monitors, facsimile machines, scanners, copiers, and audio devices. This control enhancement is generally applicable to information system output devices other than mobiles devices.

References

None.