This document discusses physical security controls and techniques. It covers common physical access controls like locks, fences, guards, and surveillance cameras. It also discusses controls for equipment like hard drive encryption, passwords, and securing printers and fax machines. The document provides details on various physical security threats and how to implement defense in depth to protect physical assets and sensitive information.