As an information security professional, you must consider potential threats to the physical security of an enterprise and plan to implement controls to mitigate associated risk. The security recommendations in your three physical control diagrams demonstrate your understanding of how the physical environment and infrastructure can affect the confidentiality, integrity, and availability of information systems.