Mechanisms exist to physically and logically inspect critical technology assets to detect evidence of tampering.
Does the organization physically and logically inspect critical technology assets to detect evidence of tampering?