We recommend protecting physical machines by installing and operating them from a protected and controlled environment. Access to both hardware and software must be actively supervised and controlled.