Power Equipment and Cabling
FedRAMP Moderate requires you to protect system power equipment and power cabling from damage and destruction by putting physical safeguards, environmental controls, routing discipline, and maintenance practices in place. Operationally, you must identify the power path, harden and separate cabling where feasible, restrict access, and keep evidence that protections are designed, implemented, and maintained. 1
Key takeaways:
- Treat power as a security dependency: map the full power chain and protect every segment, not just the UPS room.
- Prove control effectiveness with artifacts: diagrams, photos, access controls, work orders, and inspection logs.
- Align responsibilities across facilities, data center/colocation, and cloud operations so the power boundary is clear and testable.
“Power equipment and cabling” sounds like a facilities topic until an assessor asks for evidence and you realize it spans multiple teams, sites, and third parties. The FedRAMP Moderate expectation is straightforward: protect the system’s power equipment and cabling from damage and destruction. 1 The hard part is turning that sentence into a set of repeatable practices that survive personnel changes, office moves, data center expansions, and cabling “quick fixes” during outages.
For a Compliance Officer, CCO, or GRC lead, the goal is fast operational clarity: define what “system power” includes, assign ownership, and document protections in a way an auditor can verify without guesswork. This requirement is usually assessed through physical inspection, interviews with facilities and operations staff, and documentation review. You will get friction if diagrams are outdated, if responsibilities are split between your organization and a colocation provider without a clear boundary, or if “temporary” extension cords become permanent infrastructure.
This page gives you requirement-level implementation guidance you can execute quickly: scope, roles, step-by-step actions, evidence to retain, and the questions assessors tend to ask.
Regulatory text
Requirement (PE-9): “Protect power equipment and power cabling for the system from damage and destruction.” 1
Operator interpretation (plain English)
You must prevent physical damage, tampering, accidental disconnection, and environmental harm to the devices and cabling that supply electrical power to the system. That includes protecting:
- Power equipment: UPS units, PDUs, power strips used for system components, generators and transfer equipment if they directly support system availability, breakers feeding system racks, and related distribution gear.
- Power cabling: facility feeds into cages/suites, underfloor/overhead whips, rack PDUs cords, and any structured power distribution that supports system components.
This is not “write a policy.” Auditors will look for physical reality: how power is routed, who can touch it, how it is labeled, and what happens when maintenance or moves occur.
Who it applies to
In-scope entities
- Cloud Service Providers (CSPs) operating a FedRAMP Moderate system boundary. 1
- Federal Agencies running or hosting systems under FedRAMP Moderate expectations. 1
In-scope operational contexts
- Owned facilities: offices, data halls, comms rooms, MDF/IDF spaces, equipment closets that contain system components or supporting power gear.
- Colocation/data centers: your cages/suites and any provider-managed upstream power path that you rely on (your responsibility is to manage the shared-responsibility boundary and retain evidence from the third party).
- Hybrid footprints: any location with FedRAMP boundary equipment (network gear, security appliances, HSMs, bastion hosts, etc.) and its supporting power.
What you actually need to do (step-by-step)
1) Define the “system power path” and control boundary
- Inventory power-dependent assets in the system boundary (racks, appliances, network devices, security tooling).
- Map the power chain from facility feed to device inlet:
- utility/breaker/UPS/PDU/rack PDU/device
- Mark ownership per segment (Facilities, IT Ops, Data Center Ops, colocation provider, electrician).
- Document boundary assumptions: what you control directly vs. what a third party controls, and how you obtain evidence for third-party segments.
Deliverable: a current, versioned Power Path Diagram that an assessor can follow without narration.
2) Implement physical protection for power equipment
- Restrict access to rooms/cabinets containing UPS, PDUs, breaker panels that feed system racks (badge access, keys, or equivalent physical controls consistent with your site model).
- Protect from accidental impact:
- place equipment in locked rooms, cages, or protected enclosures where feasible
- prevent storage of heavy items near power gear
- Control the environment:
- keep equipment away from known leak risks
- avoid placing UPS/batteries in areas with uncontrolled temperature or moisture
- Maintenance discipline:
- require work orders for changes
- ensure qualified personnel perform electrical work
- record preventive maintenance activities in a log that’s easy to produce during audit
Practical note: assessors often accept strong compensating controls if your facility constraints prevent ideal placement, but only if you can explain the risk and show consistent operational practice.
3) Protect power cabling through routing, separation, and hardening
- Route cabling to reduce damage risk:
- prefer overhead trays/underfloor pathways instead of exposed walkways
- avoid pinch points (door thresholds, rack edges without grommets)
- Reduce accidental disconnects:
- use strain relief where appropriate
- avoid daisy-chained consumer power strips for production system gear
- secure cords inside racks with proper cable management
- Label and standardize:
- label circuits/feeds and rack PDUs so maintenance staff can identify what they are touching
- standardize color coding if your operations model supports it (document the standard)
- Separate where feasible:
- separate redundant feeds (A/B power) so a single physical event is less likely to affect both
- ensure redundant cabling does not share the same vulnerable path (for example, both cords across the same doorway)
- Protect at transitions:
- where cabling enters cages or racks, use protective sleeves, conduit, or guarded entry points if the environment presents risk
4) Control and monitor change
- Tie cabling changes to change management:
- adds/moves/changes for power circuits and cabling should create a ticket
- require post-change validation (device power redundancy intact, labels updated)
- Periodic inspections:
- walk-downs of racks and power pathways to spot hazards: exposed cords, trip risks, unlabeled feeds, blocked access to breakers/PDUs
- Incident learning loop:
- if you have an outage or near-miss caused by power/cabling, open a corrective action, track to closure, and update routing/standards
5) Manage third-party dependencies (colocation and facilities providers)
- Contract for evidence: ensure your colocation/provider agreement allows you to obtain proof of relevant physical protections for the segments they control.
- Collect and review artifacts: ask for their documentation that shows how they protect upstream power infrastructure from damage.
- Onsite validation (where permitted): perform a walkthrough of your cage/suite and photograph protections.
If you are tracking third-party due diligence in Daydream, treat power-path artifacts as part of the facilities/physical security evidence set, and link them to the system boundary so you can answer assessor questions quickly.
Required evidence and artifacts to retain
Keep artifacts in a single “PE-9 evidence pack” per site (owned facility and colocation) with clear dates and owners:
- Power Path Diagram (current version + prior versions for change history)
- Rack elevation photos showing cable management, secured PDUs, and protected routing (date-stamped)
- Access control evidence for electrical rooms/cages (access lists or attestation from facilities/colocation as appropriate)
- Work orders/tickets for power adds/changes and maintenance
- Inspection checklists and findings log (with remediation tracking)
- Standards documents:
- cabling/rack build standards
- labeling conventions
- approved power strip/PDU standards for production gear
- Third-party evidence where the provider controls upstream segments (letters/attestations, relevant excerpts, or provider documentation)
Common exam/audit questions and hangups
Expect these themes:
- “Show me what is in scope.” If you cannot clearly define which power gear supports the system boundary, you will burn time in interviews.
- “How do you prevent accidental unplugging?” Auditors want to see physical management, not verbal assurances.
- “What happens during a move/add/change?” They will test your change discipline with tickets and post-change validation evidence.
- “How do you handle colocation responsibilities?” The hangup is usually an unclear shared responsibility model and missing provider artifacts.
- “How do you know protections remain effective?” This is where inspections and maintenance logs matter.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: Treating PE-9 as a policy-only control.
Fix: prioritize diagrams, photos, inspections, and tickets. Policies support the story; they do not prove it. -
Mistake: Leaving “temporary” power runs in place.
Fix: require time-bounded exceptions with a remediation ticket and a follow-up validation step. -
Mistake: No clear ownership between Facilities and IT.
Fix: publish a RACI for power equipment and cabling; make one role accountable for the evidence pack. -
Mistake: Redundant power feeds share the same physical vulnerability.
Fix: explicitly review A/B feed routing during rack builds and after any change. -
Mistake: Colocation evidence gap.
Fix: build an evidence request checklist for providers and bake it into onboarding and annual review.
Enforcement context and risk implications
No public enforcement cases were provided for this specific requirement in the supplied sources. Practically, the risk shows up as:
- Availability incidents from accidental disconnects, cut cables, or damaged PDUs/UPS equipment.
- Security exposure if unauthorized persons can access power equipment and disrupt service or tamper with infrastructure.
- Audit findings when your documentation does not match the physical environment, especially after expansions or re-cabling.
For FedRAMP programs, recurring findings often come from evidence gaps and unclear boundaries rather than the absence of any physical protections. The fix is operational hygiene and good records.
Practical 30/60/90-day execution plan
First 30 days (stabilize scope and evidence)
- Create a site-by-site list of locations hosting boundary equipment and supporting power gear.
- Draft the Power Path Diagram for each site and validate it with Facilities/Data Center Ops.
- Start an evidence folder per site: photos, access controls, and the last maintenance records you already have.
- Identify the highest-risk cabling issues (exposed runs, trip hazards, unlabeled feeds) and open remediation tickets.
By 60 days (standardize and control change)
- Publish rack/cabling/power standards and labeling conventions; train the teams that perform installs.
- Implement a required ticket workflow for power/cabling changes with a post-change validation checklist.
- Begin routine inspections and record findings with clear owners and completion evidence.
- For colocation, request provider artifacts and document the shared responsibility boundary.
By 90 days (prove it runs without heroics)
- Perform a mock audit walkthrough: pick a rack and trace power end-to-end using only documentation.
- Close or formally risk-accept remaining nonconformities with a documented plan.
- Ensure evidence is current: update diagrams after any significant changes and refresh photos after remediations.
- Put PE-9 into your ongoing compliance calendar (inspections, evidence refresh, third-party evidence collection).
Frequently Asked Questions
Does PE-9 apply if all my workloads are in a public cloud?
It applies to the system components and locations you still control. If you have no customer-managed facilities equipment in scope, document that boundary decision and keep evidence for any in-scope power gear you do manage. 1
What counts as “power equipment” for audit purposes?
Any equipment that conditions, distributes, or physically delivers power to system components is in scope if it supports the system boundary. Keep the definition consistent with your power path diagram and inventory. 1
Do I need to show A/B power separation to satisfy PE-9?
PE-9 requires protection from damage and destruction, not a specific redundancy design. If you use A/B power, assessors will expect you to protect both feeds and avoid single points of physical failure in routing.
How do I handle a colocation provider that won’t share detailed facility diagrams?
Document what they will provide, retain their written attestations or available documentation, and supplement with evidence from your controlled area (cage/suite photos, your rack power layout, your change tickets). Your goal is a defensible boundary and repeatable evidence collection.
What is the minimum evidence set that prevents most audit churn?
A current power path diagram, dated photos of rack power and cable management, access controls for electrical areas, and tickets/logs for maintenance and changes. These four categories usually answer the first wave of assessor questions.
Where does Daydream fit into PE-9 execution?
Use Daydream to track power-path evidence by site, assign control owners, and manage third-party evidence requests for colocation and facilities providers so you can produce a complete PE-9 package on demand.
Footnotes
Frequently Asked Questions
Does PE-9 apply if all my workloads are in a public cloud?
It applies to the system components and locations you still control. If you have no customer-managed facilities equipment in scope, document that boundary decision and keep evidence for any in-scope power gear you do manage. (Source: NIST Special Publication 800-53 Revision 5)
What counts as “power equipment” for audit purposes?
Any equipment that conditions, distributes, or physically delivers power to system components is in scope if it supports the system boundary. Keep the definition consistent with your power path diagram and inventory. (Source: NIST Special Publication 800-53 Revision 5)
Do I need to show A/B power separation to satisfy PE-9?
PE-9 requires protection from damage and destruction, not a specific redundancy design. If you use A/B power, assessors will expect you to protect both feeds and avoid single points of physical failure in routing.
How do I handle a colocation provider that won’t share detailed facility diagrams?
Document what they will provide, retain their written attestations or available documentation, and supplement with evidence from your controlled area (cage/suite photos, your rack power layout, your change tickets). Your goal is a defensible boundary and repeatable evidence collection.
What is the minimum evidence set that prevents most audit churn?
A current power path diagram, dated photos of rack power and cable management, access controls for electrical areas, and tickets/logs for maintenance and changes. These four categories usually answer the first wave of assessor questions.
Where does Daydream fit into PE-9 execution?
Use Daydream to track power-path evidence by site, assign control owners, and manage third-party evidence requests for colocation and facilities providers so you can produce a complete PE-9 package on demand.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream