The CIS network of an organization comprises valuable resources in the form of hardware, software, and important information. An organization can suffer severe damage when an intruder gains access to its network resources. Therefore, an organization must strictly regulate access to its network resources.Consider the following scenario: You are part of an information security team of 3–4 personnel in a startup company. Your team has been assigned to design a policy for server room security. Each unit at your company has its own servers, which are located in a closet or computer room. The servers are also networked, so the company needs administrative controls to protect against unauthorized physical and network-based threats. Consider all threats to confidentiality, integrity, and availability and not just data theft.Based on the physical and logical access control models you have studied, conduct some additional research through the Walden Library and the Internet.For this Assignment, write a 3- to 5-page paper developing a server room security policy. Include guidelines and procedures that address physical and logical access controls for the organization. Address the following points:A brief explanation of different threats that could adversely affect servers and other network resources in the server room. For each threat, explain the potential damages.At least 3 policy guidelines and procedures to implement and maintain physical controls and processes to defend against such threats.At least 3 policy guidelines and procedures to implement and maintain logical controls and processes to defend against such threats.