Physical isolation and access control are the foundation on which you should build the security architecture. Ensuring that the physical server is installed in a secure environment protects the server against unauthorized access. Likewise, recording all serial numbers helps prevent the use of unauthorized hardware components.
These sections provide general hardware security guidelines for the servers.