Answer:
Therefore, in order to protect the physical layer, put your threat assessment and business impact analysis hats on. Find the possible trouble points. For example, check access to infrastructure, physical location to external or natural threats, recovery time and so on.