This control requires organizations to securely manage the devices used to control physical access, such as keycards, ID badges, biometric scanners, locks, and PIN pads. You must ensure only authorized individuals can use or manage these devices—and that lost or compromised access tools are immediately revoked.
Read the full blog breakdown of 3.10.5