Mechanisms exist to implement a zone-based approach to physical security.
Does the organization implement a zone-based approach to physical security?