9.1 Verify the existence of physical security controls for each computer room, data center, and other physical areas with systems that contain cardholder data
- Verify that access is controlled with badge readers and other devices including authorized badges and lock and key
- Observe a system administrator.s attempt to log into consoles for three randomly selected systems in the cardholder environment and verify that they are .locked. to prevent unauthorized use