12.3.3 A list of all such devices and personnel with access
12.3.3 Verify that the usage policies define:
• A list of all critical devices, and
• A list of personnel authorized to use the devices.
Malicious individuals may breach physical security and place their own devices on the network as a “back door.” Personnel may also bypass procedures and install devices. An accurate inventory with proper device labeling allows for quick identification of non-approved installations.