9.1 Verify the existence of physical security controls for each computer room, data center, and other physical areas with systems in the cardholder data environment.
Verify that access is controlled with badge readers or other devices including authorized badges and lock and key.
Observe a system administrator’s attempt to log into consoles for randomly selected systems in the cardholder environment and verify that they are ―locked‖ to prevent unauthorized use.