2.3.4 Implement Physical Security Countermeasures