Physical access restrictions.
Lock server rooms with key or keycard locks.
Use separate rooms for low-security and high-security systems.
Carefully manage who has keys.
Lock PC Cases .
Install a physical locking mechanism.
Use cameras or motion-sensor alarms.
Station guards near ultra-sensitive systems