Data Center Access Control Audit Checklist

General Information

Location
Date
Auditor
Department

Checklist

Item Yes/No Comments
Access points are secured and monitored
Access logs are maintained and reviewed regularly
Access is restricted to authorized personnel only
Visitor access is logged and escorted
Access cards/keys are managed and deactivated upon employee departure
Video surveillance is operational
Periodic access reviews are conducted
Emergency exits are secured and alarms are tested

Findings & Recommendations

Finding Recommendation Responsible Due Date