Physical Access to Wireless and Network Hardware
PCI DSS requires you to restrict physical access to wireless access points, gateways, networking/communications hardware, and telecommunication lines inside your facilities so unauthorized people cannot tamper with, replace, or intercept network connectivity. Operationalize this by defining what equipment is in scope, placing it in controlled areas, controlling keys/badges, logging access, and routinely checking for physical tampering. (PCI DSS v4.0.1 Requirement 9.2.3)
Key takeaways:
- Treat “network hardware” and “telecommunication lines” as in-scope assets that need physical protection, not just IT configuration controls. (PCI DSS v4.0.1 Requirement 9.2.3)
- Your assessor will look for a repeatable system: controlled locations, access authorization, access logs (where feasible), and tamper checks tied to an inventory. (PCI DSS v4.0.1 Requirement 9.2.3)
- Make it provable: diagrams, asset inventory, badge/visitor records, rack/cabinet controls, and inspection evidence are what close audits.
“Physical access to wireless and network hardware requirement” sounds simple, but teams fail it because they treat it as a facilities problem or a one-time closet lock. PCI DSS 4.0.1 Requirement 9.2.3 is broader: it covers wireless access points and gateways, core networking/communications equipment, and telecommunication lines within the facility. If an attacker (or an unvetted contractor) can touch a switch, plug into a patch panel, reset an access point, or splice a line, they can bypass logical controls.
For a Compliance Officer, CCO, or GRC lead, the fastest path is to convert this into an “in-scope physical protection system” with clear ownership: Security/Facilities controls the space, IT/Network controls the equipment and inventory, and Compliance validates evidence and exceptions. Your goal is not perfection everywhere; it is demonstrable restriction commensurate to risk, consistently applied, and verifiable during an assessment.
This page gives requirement-level guidance you can implement quickly: scope rules, step-by-step controls, the evidence package to retain, common audit hangups, and a practical execution plan.
Regulatory text
Requirement (excerpt): “Physical access to wireless access points, gateways, networking/communications hardware, and telecommunication lines within the facility is restricted.” (PCI DSS v4.0.1 Requirement 9.2.3)
Operator interpretation (plain English)
You must prevent unauthorized people from physically reaching the equipment and cabling that provide network connectivity in your facilities. Restriction can be achieved through locked rooms, locked racks/cabinets, controlled keys/badges, escorted access, and other physical controls appropriate to the environment. The assessor will expect you to show that:
- You know where the in-scope equipment and lines are.
- Only authorized personnel can access them.
- Access is controlled and managed, and exceptions do not become permanent backdoors. (PCI DSS v4.0.1 Requirement 9.2.3)
Who it applies to
PCI DSS 4.0.1 Requirement 9.2.3 applies to merchants, service providers, and payment processors in environments where payment card data is processed, stored, or transmitted, and to the facilities supporting those environments. (PCI DSS v4.0.1 Requirement 9.2.3)
Operational contexts where this becomes “real”
You should assume this requirement is in play if any of the following exist in your environment:
- Office locations with network closets, IDFs/MDFs, or shared comms rooms.
- Retail sites with back-of-house switches, routers, APs, or ISP demarc equipment.
- Data centers or co-location cages (including shared suites).
- Warehouses/call centers with extensive cabling and patch panels.
- Any site where third parties (telecom techs, low-voltage contractors, cleaning crews, managed service providers) might access wiring paths or network gear.
What you actually need to do (step-by-step)
1) Define “in-scope physical network assets”
Create a scoped list of:
- Wireless access points and controllers/gateways.
- Routers, switches, firewalls, SD-WAN appliances, cellular failover devices.
- Patch panels, network taps (if used), telecom demarcation equipment.
- Telecommunication lines within the facility: visible or accessible cabling runs, cross-connects, and termination points. (PCI DSS v4.0.1 Requirement 9.2.3)
Practical scoping rule: if touching it could change traffic flow, allow interception, or create an unauthorized connection path, treat it as in scope for restriction.
2) Map locations and access paths
You need a location-based view, not just a CMDB export. Build a simple “where it lives” register:
- Site → room/area (MDF/IDF/closet/ceiling plenum) → rack/cabinet → device(s).
- For telecom lines, identify termination points and any exposed segments (for example, accessible patch panels in shared spaces). (PCI DSS v4.0.1 Requirement 9.2.3)
Audit priority: assessors often select a sample site and ask you to physically show where APs, switches, and telecom terminations are, and how access is restricted.
3) Implement physical restriction controls by environment type
Pick controls that match the environment and can be consistently maintained.
Typical control patterns
- Network rooms/closets: solid door, locked, access limited to authorized roles; visitor/contractor access is escorted or time-bounded.
- Open-area hardware (small sites): lockable wall-mount cabinets, tamper-evident seals, or relocation to controlled areas.
- Racks in shared data centers: lock the rack or use a locked cage with an access list; align with the co-lo’s access procedures.
- Telecom lines: protect demarc and cross-connect areas; avoid exposed patching in public areas; use conduit or controlled pathways where lines would otherwise be reachable. (PCI DSS v4.0.1 Requirement 9.2.3)
4) Define authorization and manage credentials (keys/badges)
Write down who is allowed to access:
- Network rooms
- Racks/cabinets
- Telecom demarc areas
Then operationalize:
- Role-based access approvals (Network Engineering, Facilities, Security, approved third-party technicians).
- Joiner/mover/leaver process: when someone changes roles or leaves, their access is removed promptly.
- Key control: issuance records, returns, and periodic reconciliation (especially for mechanical keys). (PCI DSS v4.0.1 Requirement 9.2.3)
5) Control third-party physical access
Third parties are common failure points because they legitimately need access, but oversight is weak.
Minimum expectations you should be able to defend:
- Work orders or tickets that justify access to a network room/demarc area.
- Escort requirements for non-authorized third parties, or a documented alternative that still “restricts” access.
- Visitor logging at reception or building security, tied to identity verification and time in/out. (PCI DSS v4.0.1 Requirement 9.2.3)
6) Add tamper detection and routine checks
“Restricted” is stronger when paired with evidence that you would notice tampering:
- Periodic walk-through checks of closets/racks/cabinets for unlocked doors, broken seals, rogue devices, or unapproved cabling changes.
- Spot checks of wireless access points in public-facing areas (lobbies, conference zones) for unauthorized replacement.
- A process to investigate anomalies (for example, an unexpected AP MAC address, an open rack door, or a moved patch cord). (PCI DSS v4.0.1 Requirement 9.2.3)
7) Document exceptions and compensating controls
Some sites cannot practically lock every wiring pathway. Don’t hand-wave it.
- Record exceptions with the specific asset/location, reason, and the alternative restriction (for example, locked cabinet plus CCTV coverage plus staff-only area).
- Tie exceptions to a review cadence and an owner. (PCI DSS v4.0.1 Requirement 9.2.3)
8) Build your assessment-ready narrative (what you will say and show)
For each site type, be able to explain:
- What is protected (asset/location list).
- How it is protected (locks, badges, escorts, cabinets, cages).
- How access is authorized and revoked (process and records).
- How you detect and respond to tampering (inspections and tickets). (PCI DSS v4.0.1 Requirement 9.2.3)
Required evidence and artifacts to retain
Keep these artifacts in an audit folder structured by site or region:
Policies and standards
- Physical security standard covering network rooms, racks/cabinets, and telecom termination areas.
- Access authorization standard (roles, approvals, escort rules) mapped to network spaces. (PCI DSS v4.0.1 Requirement 9.2.3)
Inventory and diagrams
- Inventory of wireless access points, gateways, and network/communications hardware (with location).
- Site floor plans or network closet location lists.
- Rack elevation diagrams or cabinet lists where applicable.
- Telecom demarc/cross-connect location documentation. (PCI DSS v4.0.1 Requirement 9.2.3)
Access control records
- Badge access lists for network rooms (who has access and why).
- Key issuance logs (if mechanical keys exist).
- Visitor logs and contractor sign-in records where used.
- Work orders/tickets for third-party telecom/network work. (PCI DSS v4.0.1 Requirement 9.2.3)
Operational logs
- Inspection checklists and completed walk-through records.
- Incident/ticket records for found-open doors, missing seals, rogue devices, or unauthorized cabling changes and the resolution. (PCI DSS v4.0.1 Requirement 9.2.3)
Where Daydream fits: if you use Daydream to manage third-party risk and evidence collection, set up a recurring evidence request workflow for facilities and network teams (badge access list exports, inspection records, and third-party access tickets) and tie it to your PCI DSS control library so the audit package stays current.
Common exam/audit questions and hangups
Assessors commonly probe these areas for Requirement 9.2.3: (PCI DSS v4.0.1 Requirement 9.2.3)
- “Show me where your APs are and who can reach them.” Hangup: APs mounted in public or semi-public spaces without tamper controls or monitoring.
- “Who has access to this closet, and how do you know it’s current?” Hangup: badge groups that include broad IT or building staff without justification.
- “How do telecom techs get into the demarc?” Hangup: “the carrier has a key” with no logs, no escort, and no work order trail.
- “How do you detect physical tampering?” Hangup: locks exist, but nobody checks for propped doors, missing panels, or unexpected devices.
Frequent implementation mistakes (and how to avoid them)
| Mistake | Why it fails | Fix |
|---|---|---|
| Treating “restricted” as “locked sometimes” | Inconsistent controls look unmanaged | Assign owners, document rules, and verify with inspections. (PCI DSS v4.0.1 Requirement 9.2.3) |
| Ignoring telecom lines and demarc areas | The requirement explicitly includes telecommunication lines | Map termination points and restrict access like network rooms. (PCI DSS v4.0.1 Requirement 9.2.3) |
| Over-permissioned badge groups | Broad access is hard to justify | Use role-based authorization and periodic reviews of access lists. |
| No evidence of enforcement | Controls without records are hard to validate | Keep access lists, logs, and inspection artifacts in an audit-ready repository. |
| Third-party access unmanaged | Contractors are a realistic tamper path | Require work orders/tickets and escort rules, retain sign-in records. |
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this specific PCI DSS requirement, so you should treat risk as assessor-driven and threat-driven rather than tied to a particular published penalty narrative.
Operationally, physical access gaps can negate strong logical controls. A compromised access point can provide rogue wireless entry. An exposed patch panel can allow unauthorized network insertion. Uncontrolled demarc access can enable interception or redirection. Requirement 9.2.3 exists to reduce these failure modes by making physical tampering difficult and detectable. (PCI DSS v4.0.1 Requirement 9.2.3)
Practical 30/60/90-day execution plan
First 30 days: Stabilize scope and obvious gaps
- Name owners: Facilities/Security for spaces, Network/IT for equipment inventory, Compliance for evidence.
- Build the initial in-scope asset and location register (APs, gateways, network hardware, telecom terminations). (PCI DSS v4.0.1 Requirement 9.2.3)
- Identify “unrestricted exposure” hotspots: unlocked closets, network gear on open shelves, demarc access shared with many people.
- Implement quick controls: lock doors, move gear into lockable cabinets, restrict badge group membership for network spaces.
Days 31–60: Make it repeatable and auditable
- Publish a short standard for physical restriction of network hardware and telecom areas that operations can follow.
- Formalize authorization and third-party access workflow (work order + escort or approved access list + logging).
- Start routine inspections and recordkeeping (checklists + tickets for findings). (PCI DSS v4.0.1 Requirement 9.2.3)
- Centralize evidence collection in a shared repository; if you use Daydream, schedule evidence requests and map artifacts to the requirement.
Days 61–90: Close edge cases and mature controls
- Address complex sites: shared suites, co-los, retail remodels, and high-traffic areas with public AP coverage.
- Validate access list hygiene with a review and remove stale access.
- Test the audit script: pick a site sample and run a mock walk-through to confirm you can “show and prove” restriction end-to-end. (PCI DSS v4.0.1 Requirement 9.2.3)
- Document exceptions with compensating controls and an owner review process.
Frequently Asked Questions
Does this requirement apply to telecom demarc rooms and patch panels?
Yes. The text explicitly includes “telecommunication lines within the facility,” which in practice includes termination points and accessible cross-connect/patching areas. (PCI DSS v4.0.1 Requirement 9.2.3)
If the building has badge access at the front door, is that enough?
Usually not by itself. You still need restriction to the specific network rooms, racks/cabinets, and telecom areas because many authorized building occupants should not reach network hardware. (PCI DSS v4.0.1 Requirement 9.2.3)
What counts as “restricted” for wireless access points mounted in public areas?
Restriction typically means preventing easy removal or tampering and limiting who can physically reach the device. Use controlled mounting locations where possible, and add physical protections and routine checks when relocation is not feasible. (PCI DSS v4.0.1 Requirement 9.2.3)
How should we handle third-party ISP or carrier technicians who “need a key”?
Treat them as third parties with controlled access. Require a work order/ticket, track entry and exit, and use escorting or time-bounded authorization to keep access restricted and provable. (PCI DSS v4.0.1 Requirement 9.2.3)
Do we need access logs for every closet and cabinet?
The requirement is that access is restricted; your assessor will still expect you to show how you manage and evidence that restriction. Where electronic logs are not feasible, compensate with key logs, visitor logs, inspections, and documented procedures. (PCI DSS v4.0.1 Requirement 9.2.3)
What evidence is most persuasive in a PCI assessment?
A location-based inventory tied to controlled spaces, current access lists (badges/keys), third-party access records, and inspection/tamper-check evidence. Together, these show restriction is real and maintained. (PCI DSS v4.0.1 Requirement 9.2.3)
Frequently Asked Questions
Does this requirement apply to telecom demarc rooms and patch panels?
Yes. The text explicitly includes “telecommunication lines within the facility,” which in practice includes termination points and accessible cross-connect/patching areas. (PCI DSS v4.0.1 Requirement 9.2.3)
If the building has badge access at the front door, is that enough?
Usually not by itself. You still need restriction to the specific network rooms, racks/cabinets, and telecom areas because many authorized building occupants should not reach network hardware. (PCI DSS v4.0.1 Requirement 9.2.3)
What counts as “restricted” for wireless access points mounted in public areas?
Restriction typically means preventing easy removal or tampering and limiting who can physically reach the device. Use controlled mounting locations where possible, and add physical protections and routine checks when relocation is not feasible. (PCI DSS v4.0.1 Requirement 9.2.3)
How should we handle third-party ISP or carrier technicians who “need a key”?
Treat them as third parties with controlled access. Require a work order/ticket, track entry and exit, and use escorting or time-bounded authorization to keep access restricted and provable. (PCI DSS v4.0.1 Requirement 9.2.3)
Do we need access logs for every closet and cabinet?
The requirement is that access is restricted; your assessor will still expect you to show how you manage and evidence that restriction. Where electronic logs are not feasible, compensate with key logs, visitor logs, inspections, and documented procedures. (PCI DSS v4.0.1 Requirement 9.2.3)
What evidence is most persuasive in a PCI assessment?
A location-based inventory tied to controlled spaces, current access lists (badges/keys), third-party access records, and inspection/tamper-check evidence. Together, these show restriction is real and maintained. (PCI DSS v4.0.1 Requirement 9.2.3)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream