Class 9 ‐ Physical Security - Justin-Boyd/CIT-Class GitHub Wiki
Introduction to Physical Security
Why Physical Security?
- Physical barriers are essential in any organization.
- Cybersecurity is irrelevant if anyone can walk into the server room and steal or damage the server.
- Physical security must be layered for maximum protection.
Physical Security Goals
- Provide a safe environment for all assets.
- Both intruders and natural disasters must be taken into account.
- The most important asset will always be human life.
- Assets are people, intellectual property, information, equipment, IT infrastructure, facilities, etc.
Defense in Layers
- A crucial aspect of physical security.
- An invader can maneuverer around a single layer of controls.
- There must be a next layer of controls that can help stop the invader from advancing further.
Access Control
Identification
-
User-Activated Reader
- The user is active in identification and authorization.
- Actions can include swiping a card, entering a PIN, and biometric identification.
-
System Sensor Access Control Reader
- The reader senses an approaching object and scans for a card or token. This type of reader is known as a transponder.
-
Passive RFID (Radio Frequency Identification) only requires proximity to a reader and does not require a battery.
The First Line of Defense
- Provides a psychological deterrent
- Different gauges and mesh sizes are used for different levels of security.
- The Perimeter Intrusion Detection and Assessment System (PIDAS) fencing method is also known as a smart fence.
Bollards
- Prevent vehicles from accessing restricted areas
- Placed between a facility and a parking lot or roads that run close to exterior walls
Lighting
- Lights should be installed with overlapping zones.
- More light should be used at entrances, less light at guard locations.
- Lighting redundancy should be implemented in case of a power outage.
- Poorly lit or unlit areas invite trespassers.
Motion Detection
- Electrical device that detects object motion
- Alerts staff by triggering alarms (silent or audible)
Facility Access Control
-
Facilities
- Should be grouped in segments with each segment or area having its own purpose and access controls.
-
Locks
- Serve as delaying mechanisms for intruders. They vary in strength, quality, and functionality.
-
Access control mechanisms should maintain an audit trail of authorized and unauthorized entry attempts.
Administrative Responsibilities
- The right type of lock should match its purpose.
- Locks and keys require scheduled maintenance to prevent deterioration.
- Written procedures should be followed for key distribution and management.
Circumventing Locks
-
Locks can be picked in many ways: raking, rocking, bumping, zipping, and more.
-
Determined intruders may use power tools or even attempt to dismantle the door.
Surveillance
What Is Surveillance?
- Continuous monitoring, and sometimes physical action, in surveyed areas.
- Facilities should remain under surveillance to ensure swift reaction to intrusions.
CCTV
- Detects, follows, and exposes intruders
- Can operate in internal and external facility areas
- Must be integrated with other security controls
CCTV Components
- Camera
- Transmitter
- Receiver
- Recording System (DVR)
- Monitor
Intrusion Detection System
What Is a Physical IDS?
- A perimeter-scanning device
- Sensitive to changes in the environment
- Can detect a wide variety of changes
IDS Types
-
Electromechanical Systems
- Detect changes or breaks in a circuit. Can be a magnetic contact switch, pressure plate, etc.
-
Photoelectric/Photometric Systems
- Emit beams of light and generate alarms when the beam is interrupted.
-
Passive Infrared Systems
- Monitor room temperature and report when the temperature rises.
-
Acoustic Detection Systems
- Highly sensitive microphones that detect possible forced entry sounds.
-
Wave-Pattern Motion Detectors
- Generate wave patterns, transmit them to receivers, and if the returned pattern is different, an intruder is likely present.
-
Proximity/Capacitance Detectors
- Emit magnetic fields and generate alarms if the field is disrupted.
Sensor Impossible
Patrol Forces
Security Guards
-
Pros
- Can help prevent tailgating (piggy-backing)
- Used as a deterrent
- Training and exercises
- Procedures required
-
Cons
- Most expensive form of control
- Armed or not?
- Fixed patrol location
- Vulnerable to social engineering attacks
Guard Dogs
- Trainable, extremely loyal
- Have extraordinary sense of smell and hearing
- Considered a supplementary security measure
Auditing Physical Access
Access Logs
- Examined to reveal attempts to breach entry points in the facility
- Should be reviewed periodically by the facility manager
- Although not a preventive measure, logs are often used in cybersecurity forensics investigations.
Logged Information
- Dates and times of attempts to access the facility
- Facility entry point events
- IDs of individuals who attempt to breach the facility
- Both successful and unsuccessful attempts are recorded.
Auditing Permissions
- Roles of personnel change
- Zero trust policy
- Mandatory vacation
- The threats are both outside and inside
Securing the Physical Structure
Natural Access Control
- Guiding people to the desired entrance of a facility via indirect means
- Landscaping, light placement, fences, and doors indicate where people can and cannot go.
Physical Security Plan
- Construction Materials
- Power Distribution Systems
- Communication Types
- External Factors
- When planning physical security, the elements above must be considered.
Facility Considerations
- Proximity to emergency services
- Urban and natural camouflage
- Electronic eavesdropping
Window Types
- Standard windows: Very low level of protection
- Non-glass windows (acrylic): Better protection
- Laminated or wire layer: Best protection
Physical Security Threats & Solutions
Shoulder Surfing
-
Drones
- Drones can be used for shoulder surfing or facility reconnaissance.
- Mitigation: Use tinted windows.
-
Open Space
- Placing employees in an open space makes them vulnerable to shoulder surfing.
- Mitigation: Use anti-glare screens.
Access Control
-
Access Card Duplication
- Employee cards can be duplicated.
- Mitigation: Special wallets that block RFID
-
Tailgating/Piggy-backing
- Following behind an authorized user into a facility
- Mitigation: Posting a guard can deter this behavior.
-
2FA can also be implemented via physical security.
Physical Approach
- Connecting a USB device to a computer to run malware
- Connecting a laptop to a switch to gain network access
- Data theft of documents or other valuable assets
- Facility segregation should be designed to reduce the risk of an attacker freely entering an area.
Natural Disasters
- Earthquakes
- Tsunamis
- Hurricanes, Typhoons, Cyclones
- Volcanic Eruptions
- Wildfires
Fukushima Daiichi Nuclear Disaster
- A 7.0 magnitude earthquake followed by a 128-foot tsunami.
- The tsunami disabled the power supply and cooling systems of three reactors.
- All three cores melted during the first three days.