6.1.2 Physical Security
Physical Security Controls
Overview
Physical security is a critical element of cybersecurity.
Effective physical security measures are essential in protecting an organization's assets, including servers and data centers, from unauthorized access, theft, or damage.
Key elements of physical security include:
Access control mechanisms
Video surveillance
Environmental controls
Importance of Physical Security in Cybersecurity
Physical security provides the first line of defense against physical access to critical assets.
Protects both digital and physical assets, ensuring the safety of the data and infrastructure.
Organizations should integrate physical security practices within cybersecurity strategies for comprehensive protection against cyber threats that exploit physical vulnerabilities.
Major Topics Covered
Physical Security Controls
Access Control Mechanisms
Surveillance Systems
Environmental Design for Physical Security
Alarm Systems and Sensors
Physical Attacks
Physical Security Facts
Key Concepts
Physical security is paramount in cybersecurity operations, serving to thwart unauthorized access to sensitive data and systems, thereby reducing insider threats.
Physical Security Concepts and Mechanisms
Security Mechanisms
Authentication: Defines mechanisms to create access lists and allow approved individuals through security barriers.
Authorization: Establishes barriers around resources to control entry and exit.
Accounting: Records the utilization of entry/exit points and identifies security breaches.
Categorical Approaches to Physical Security
Often implemented through zones separated by physical barriers, with increasing levels of accessibility restriction.
Examples of Security Measures
Access Control Mechanisms:
Biometric scanners
Smart cards
Key fobs
Surveillance Systems:
Video cameras, motion sensors, alarms
Backup power for critical systems
Physical Security Through Environmental Design
Designing environments to enhance security and prevent crime by implementing non-obvious security features.
Applicable in various settings: residential, commercial, schools, and public spaces.
Cost-effective methods to improve security using architectural design.
Effective Environmental Design Options
Redundant cooling and fire suppression systems are crucial for data centers.
Strategies for effective environmental design include creating secure perimeters using fences and maintaining a welcoming appearance for public-facing businesses.
Physical Barriers and Design Principles
Fencing
Protects building exteriors; it should be:
Transparent for visibility
Robust against cutting
Tall and may use barbed wire for effectiveness
Security Lighting
Essential for nighttime safety perceptions; helps deter intrusion and enhances surveillance effectiveness.
Proper design counters shadowy areas and aids facial recognition.
Bollards
Short vertical posts that prevent vehicles from accessing sensitive areas while also safeguarding pedestrian areas.
Variants include:
Fixed
Retractable (including remote control)
Access Point Management
Implement mechanisms to manage traffic in secured zones, using visible security measures as deterrents.
Access Control Technologies
Types of Locks
Physical Locks:
Conventional locks preventing operation without a key.
Electronic Locks:
Operated by entering a PIN or using smart cards.
Biometric Locks:
Integrate biometric scanners to authenticate users.
Access Control Vestibules
Regulate entry to secure areas with interlocking doors to ensure only one person enters at a time, reducing the risk of unauthorized access.
Access Badges
Fundamental for access control in large organizations, made of:
Plastic cards with magnetic strips or RFID chips.
Badges control entry by verifying identification against a centralized system.
PACS manage access, log activities for audit and security investigations.
Surveillance Measures
Security Guards and Surveillance Cameras
Human Guards:
Provide physical presence and monitoring at checkpoints.
Can be armed or unarmed to restrict access and verify identities.
Camera Systems:
Various configurations including CCTV networks and cameras linked through IP networks.
Capable of smart integrations using AI for enhanced detection and monitoring capabilities.
Alarms and Sensors
Types of Alarm Systems
Circuit-based alarms, motion detectors, noise detection alarms, and proximity sensors.
Alerts can signify unauthorized entry or disturbances.
Duress Alarms:
Activated under threat by staff for emergencies.
Sensor Variants
Infrared Sensors:
Detect heat changes for motion detection.
Pressure Sensors:
Detect weight changes for access control.
Microwave Sensors:
Measure movement and assist in dual-technology sensors.
Ultrasonic Sensors:
Used for automated actions based on space occupancy.
Types of Physical Attacks
Examples of Physical Attacks
Brute Force Attacks:
Physical destruction of devices for denial of service.
Infrastructure Attacks:
Targeting cabling, hardware, or environmental systems for access or disruption.
RFID Cloning and Skimming:
Cloning or capturing unauthorized access credentials.
Environmental Attacks:
Disrupting services by targeting power lines or cooling systems.
Conclusion
Physical security, through various mechanisms, safeguards information and infrastructure from physical and cyber threats, integrating seamlessly with cybersecurity measures to ensure comprehensive protection for organizations.