Secure the physical hardware that hosts the MID Server or the hypervisor for virtualized MID Servers.

  • Place the hardware in a secure location that protects the hardware from unauthorized access.
  • Protect access to this location with an electronic card reader and CCTV monitoring.
  • Place the physical hardware in a locked cage or a rack with physical key access control.