How to implement the control:
As per control [J4](https://www.riskledger.com/resources/framework/j/4 "Control J4"), an access control system should be implemented by an access control or physical security specialist who can help you to choose the correct specification of system and configure the system in a secure manner. The system should be configured to store all physical access logs. These logs should be protected using encryption controls. For SMEs, most offices for rent will use an access control system that is under the control of the landlord. Speak to your landlord to find out how long the logs are kept for, and for the controls in place to protect the logs.