[PCI DSS 3.0] 12.3.3 A list of all such devices and personnel with access

12.3.3 A list of all such devices and personnel with access

12.3.3 Verify that the usage policies define a list of all devices and personnel authorized to use the devices.

Malicious individuals may breach physical security and place their own devices on the network as a “back door.” Personnel may also bypass procedures and install devices. An accurate inventory with proper device labeling allows for quick identification of non-approved installations.