6.1.2 Physical Security

Physical Security Controls

Overview

  • Physical security is a critical element of cybersecurity.

  • Effective physical security measures are essential in protecting an organization's assets, including servers and data centers, from unauthorized access, theft, or damage.

  • Key elements of physical security include:

    • Access control mechanisms

    • Video surveillance

    • Environmental controls

Importance of Physical Security in Cybersecurity

  • Physical security provides the first line of defense against physical access to critical assets.

  • Protects both digital and physical assets, ensuring the safety of the data and infrastructure.

  • Organizations should integrate physical security practices within cybersecurity strategies for comprehensive protection against cyber threats that exploit physical vulnerabilities.

Major Topics Covered

  1. Physical Security Controls

  2. Access Control Mechanisms

  3. Surveillance Systems

  4. Environmental Design for Physical Security

  5. Alarm Systems and Sensors

  6. Physical Attacks


Physical Security Facts

Key Concepts

  • Physical security is paramount in cybersecurity operations, serving to thwart unauthorized access to sensitive data and systems, thereby reducing insider threats.


Physical Security Concepts and Mechanisms

Security Mechanisms

  • Authentication: Defines mechanisms to create access lists and allow approved individuals through security barriers.

  • Authorization: Establishes barriers around resources to control entry and exit.

  • Accounting: Records the utilization of entry/exit points and identifies security breaches.

Categorical Approaches to Physical Security

  • Often implemented through zones separated by physical barriers, with increasing levels of accessibility restriction.

Examples of Security Measures
  • Access Control Mechanisms:

    • Biometric scanners

    • Smart cards

    • Key fobs

  • Surveillance Systems:

    • Video cameras, motion sensors, alarms

    • Backup power for critical systems


Physical Security Through Environmental Design

  • Designing environments to enhance security and prevent crime by implementing non-obvious security features.

  • Applicable in various settings: residential, commercial, schools, and public spaces.

  • Cost-effective methods to improve security using architectural design.

Effective Environmental Design Options
  • Redundant cooling and fire suppression systems are crucial for data centers.

  • Strategies for effective environmental design include creating secure perimeters using fences and maintaining a welcoming appearance for public-facing businesses.


Physical Barriers and Design Principles

Fencing

  • Protects building exteriors; it should be:

    • Transparent for visibility

    • Robust against cutting

    • Tall and may use barbed wire for effectiveness

Security Lighting

  • Essential for nighttime safety perceptions; helps deter intrusion and enhances surveillance effectiveness.

  • Proper design counters shadowy areas and aids facial recognition.

Bollards

  • Short vertical posts that prevent vehicles from accessing sensitive areas while also safeguarding pedestrian areas.

  • Variants include:

    • Fixed

    • Retractable (including remote control)

Access Point Management

  • Implement mechanisms to manage traffic in secured zones, using visible security measures as deterrents.


Access Control Technologies

Types of Locks

  • Physical Locks:

    • Conventional locks preventing operation without a key.

  • Electronic Locks:

    • Operated by entering a PIN or using smart cards.

  • Biometric Locks:

    • Integrate biometric scanners to authenticate users.

Access Control Vestibules
  • Regulate entry to secure areas with interlocking doors to ensure only one person enters at a time, reducing the risk of unauthorized access.


Access Badges

  • Fundamental for access control in large organizations, made of:

    • Plastic cards with magnetic strips or RFID chips.

  • Badges control entry by verifying identification against a centralized system.

  • PACS manage access, log activities for audit and security investigations.


Surveillance Measures

Security Guards and Surveillance Cameras

  • Human Guards:

    • Provide physical presence and monitoring at checkpoints.

    • Can be armed or unarmed to restrict access and verify identities.

  • Camera Systems:

    • Various configurations including CCTV networks and cameras linked through IP networks.

    • Capable of smart integrations using AI for enhanced detection and monitoring capabilities.


Alarms and Sensors

Types of Alarm Systems

  • Circuit-based alarms, motion detectors, noise detection alarms, and proximity sensors.

  • Alerts can signify unauthorized entry or disturbances.

  • Duress Alarms:

    • Activated under threat by staff for emergencies.

Sensor Variants

  • Infrared Sensors:

    • Detect heat changes for motion detection.

  • Pressure Sensors:

    • Detect weight changes for access control.

  • Microwave Sensors:

    • Measure movement and assist in dual-technology sensors.

  • Ultrasonic Sensors:

    • Used for automated actions based on space occupancy.


Types of Physical Attacks

Examples of Physical Attacks

  • Brute Force Attacks:

    • Physical destruction of devices for denial of service.

  • Infrastructure Attacks:

    • Targeting cabling, hardware, or environmental systems for access or disruption.

  • RFID Cloning and Skimming:

    • Cloning or capturing unauthorized access credentials.

  • Environmental Attacks:

    • Disrupting services by targeting power lines or cooling systems.


Conclusion

  • Physical security, through various mechanisms, safeguards information and infrastructure from physical and cyber threats, integrating seamlessly with cybersecurity measures to ensure comprehensive protection for organizations.