You should physically secure all hardware hosting PPM to maintain a safe implementation environment. Consider the following when planning your physical security strategy:
- You should install, configure, manage, and maintain your environment according to guidance in all applicable installation and configuration documentation for PPM.
- You should install PPM components in controlled access facilities to prevent unauthorized access. Only authorized administrators for the systems hosting PPM should have physical access to those systems. Such administrators include the Operating System Administrators, Application Server Administrators, and Database Administrators.
- You should use Administrator access to client machines only when you install and configure PPM.