You should physically secure all hardware hosting P6 Professional to maintain a safe implementation environment. Consider the following when planning your physical security strategy:
- You should install, configure, manage, and maintain your environment according to guidance in all applicable installation and configuration documentation for P6 Professional.
- You should install P6 Professional components in controlled access facilities to prevent unauthorized access. Only authorized administrators for the systems hosting P6 Professional should have physical access to those systems. Such administrators include the Operating System Administrators, Application Server Administrators, and Database Administrators.
- You should use Administrator access to client machines only when you install and configure P6 Professional modules.