Control access to critical systems

<p>Apply a broad range of physical, technological, and cyber measures to control access to critical locations and systems, e.g. apply international standards and best practices</p>