"security" audits ...
A previous employer had one, and they got very upset that developers were allowed in the server room to access development servers, since the production ones were kept there. This was despite the fact that a developer needed an IT bod to walk them in through the cardlock.
So a KVM (called Kaveman) solution was installed. Great. We went from audited controlled access to development machines, to unaudited, and uncontrolled access via KVM. Yes there was a password. One between 10 in the team, and hardly a secret
But this was more secure than before. Apparently. Oh, until 3 year on, when a different outfit was hired. They insisted KVM access was a security risk, and suggested the servers only be accessed physically.
Rinse and repeat.