We recommend protecting the physical machines by installing and operating them from a protected and controlled environment. Access to both hardware and software must be actively supervised and controlled.