© copyright 2005 (isc) 2® all rights reserved. 1 physical security v5.0 physical security

89
© Copyright 2005 (ISC) All Rights Reserved. 1 Physical Security v5.0 Physical Security

Upload: sheila-ramsey

Post on 24-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

1Physical Security v5.0

Physical Security

Page 2: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

2Physical Security v5.0

Introduction

The physical security domain provides

protection techniques for the entire facility,

from the outside perimeter to the inside

office space, including all of the information

system resources.

Page 3: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

3Physical Security v5.0

Physical Security Definition

• The physical measures & their associated procedures to safeguard & protect against:

• Damage• Loss• Theft

• Implementing controls that discourage attackers by convincing them that the cost of attacking is greater than the value received from the attack.

Page 4: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

4Physical Security v5.0

Objectives

The CISSP should be able to:– Describe the threats, vulnerabilities, and

countermeasures related to physically protecting the enterprise’s sensitive information assets.

– Identify the risk to facilities, data, media, equipment, support systems, and supplies as they relate to physical security.

Page 5: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

5Physical Security v5.0

Section Objectives

• List the goals of physical controls

• List the threats to physical security

• Describe Crime Prevention Through Environmental Design

Page 6: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

6

© Copyright 2005 (ISC)2® All Rights Reserved.

6Physical Security v5.0

Goals of Information Security

• The common thread among good information security objectives is that they address all three core security principles.

AvailabilityAvailability

Con

fiden

tialit

y

Prevents unauthorized

disclosure of systems and

information.

IntegrityPrevents unauthorized

modification of systems and

information.

Prevents disruption of

service and productivity.

Page 7: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

7Physical Security v5.0

Physical Security Requirements

Life Safety

Safety of people is the primary concern.

Page 8: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

8Physical Security v5.0

Goals of Physical Security

1. Deter

2. Delay

3. Detect

4. Assess

5. Respond

Page 9: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

9Physical Security v5.0

Threats to Physical Security

• Natural/Environmental (e.g., earthquakes, floods, storms, hurricanes, fires)

• Utility Systems (e.g., communication outages, power outages)

• Human-Made/Political Events (e.g., explosions, vandalism, theft, terrorist attacks, riots)

Page 10: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

10Physical Security v5.0

Natural Events

Page 11: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

11Physical Security v5.0

Malicious Threats

Shoulder Surfing

Social Engineering

Dumpster Diving

Theft

Espionage

6 Key Threat

s

Theft

• Internal/external results in increased costs

Espionage

• Loss of intellectual property & market share

Dumpster Diving

• Access to sensitive corporate information

Social Engineering

• Intelligence Attack

Shoulder Surfing

• Results in unauthorized access

HVAC

• Access via HVAC vents

HVAC Access

Page 12: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

12Physical Security v5.0

Countermeasures

• Layered Defense System• Disposal PolicyDumpster Diving

• Employee Tracking & Job Rotation• Strict Internal ControlsEspionage

• IDS & Locked Doors and Keys• Access ControlTheft

Page 13: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

13Physical Security v5.0

Countermeasures

• Narrow Shafts• Section Lock Downs HVAC Access

• Keyboard Keystroke Placement• Awareness of your SurroundingsShoulder Surfing

Social Engineering• Employee Accountability• Employee Security Awareness

Page 14: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

14Physical Security v5.0

Physical SecuritySubtopics

• Layered Defense Model

• Crime Prevention Through Environmental Design

• Site Location

• Facility Construction Impacts

• Infrastructure Support Systems

Page 15: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

15Physical Security v5.0

Layered Defense Model

Perimeter

Building Entrance

Building Floors/Office Suites

Offices/Data Centers/Equipment,Supplies, Media

Building Grounds

Page 16: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

16Physical Security v5.0

Crime Prevention Through Environmental Design

• The physical environment of a building is changed or managed to produce behavioral effects that will assist in reducing the incidence and fear of crime.

• Focuses on the relationships between the social behavior of people and the environments.

Page 17: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

17Physical Security v5.0

Crime Prevention Through Environmental Design

Three Key Strategies

• Territoriality - people protect territory that is their own

• Surveillance - high degree of visual control

• Access Control - limit access and control the flow of access

Page 18: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

18Physical Security v5.0

Site Location

Security should include where the building is and how it should be built.

Crime?Riots?Natural disasters?Adjacent buildings?

Airport? Highway?Military Base?Emergency support systems?

Page 19: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

19Physical Security v5.0

Facility/Construction Issues

• Walls, Windows, and Doors• Entry Points

– Primary & secondary entrances

– Windows– Roof access– Maintenance entrance– Emergency exits– Loading docks

Page 20: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

20Physical Security v5.0

Doors

• Hollow-core versus solid-core

• Isolation of critical areas

• Lighting of doorways

• Contact Devices (switches)

• Mantraps (double door systems)

Page 21: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

21Physical Security v5.0

Door Safety

Doors• Do not block exit doors• Provide sufficient and appropriate

lock mechanics• Hinges securely fixed to the

frames • Frame securely fixed to the

adjoining wall.

Page 22: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

22Physical Security v5.0

Windows

• Standard plate glass

• Tempered glass

• Acrylic materials

• Polycarbonate windows - glass and polycarbonite combinations combine the best quality of glass and acrylics

Page 23: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

23Physical Security v5.0

Windows cont…

• Laminated Glass

• Wired Glass

• Solar Window Films

• Window Security Films

• Glass Breakage Sensors

Page 24: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

24Physical Security v5.0

Infrastructure Support Systems

• Infrastructure Support Systems include electrical power, water/plumbing, steam, gas lines, and heating, ventilation, air conditioning (HVAC), and refrigeration.

Page 25: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

25Physical Security v5.0

Support System Threats

HVAC

Gas Leakage

Power Loss

Fire

Water

5 Key Threat

s

Fire

• Damage & destruction of facilities/equipment

Water

• Flooding/dripping

Power Loss

• Disruption/stop in operations

Gas Leakage

• Explosion

HVAC

• Overheating/overcooling

Page 26: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

26Physical Security v5.0

Fire

Best Practices–Fire Containment System (floors,

vents, HVAC)–Fire Extinguishing System

(permanent & mobile)–Abiding by the Fire Codes–Fire Prevention Training and Drills

Page 27: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

27Physical Security v5.0

Fire Protection Subtopics

• Fire Prevention – reduce causes of fire.

• Fire Detection - receive warnings of fire before it becomes a problem.

• Fire Suppression - how to extinguish and contain a fire to minimize damage.

Page 28: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

28Physical Security v5.0

Fire Prevention

• Use fire resistant materials for walls, doors, furnishings, etc.

• Reduce the amount of combustible papers around electrical equipment.

• Provide fire-prevention training to employees - remember, life safety is the most important issue.

• Conduct fire drills on all shifts so that personnel know how to safely exit a building.

Page 29: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

29Physical Security v5.0

Fire Detection

• Ionization-type smoke detectors detect charged particles in smoke.

• Optical (Photoelectric) detectors react to light blockage caused by smoke.

• Fixed or rate-of-rise temperature sensors - heat detectors that react to the heat of a fire.

• Combinations are usually used for the best effectiveness in detecting a fire.

Page 30: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

30Physical Security v5.0

Fire Types and Suppression

Class Type Suppression Agents

A Common combustibles

Water, foam, dry chemicals

B Liquid Gas, CO2, foam, dry chemicals

C Electrical Gas, CO2, dry chemicals

D Combustible metals Dry powders

K Commercial kitchens Wet chemicals

Page 31: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

31Physical Security v5.0

Fire Suppression Agents

• Carbon Dioxide (CO2) extinguishers provide a colorless, odorless chemical that displaces oxygen in the air.

• Halon gas - contains a white bromine powder produced in chlorofluorocarbon compounds (CFC)– factor in the depletion of the ozone layer.

• FM200 most effective alternative - requires 7% concentration (Halon requires 5%)

Page 32: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

32Physical Security v5.0

Halon Gas

• 1987 Montreal Protocol on Substances that Deplete the Ozone Layer.– Began implementation in 1992– Any new installations of fire suppression

systems must use alternate options– EU requires removal of Halon for most

applications

Page 33: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

33Physical Security v5.0

Fire Suppression

• Water Sprinkler Systems– Water could be a conductor of

electricity - it may compound the problems in computer rooms.

– Water can cause damage to electrical equipment.

– “Pre-action” or “dry-pipe” system - water is held back by a valve and is released when the sensor activates.

Page 34: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

34Physical Security v5.0

Gas Threats

• Gas Leakage– Identify Location and Test the main

Shut-Off valve– Secure the Natural Gas Line (using

layered defenses)– Communicate Natural Gas Line Design

to Fire Department– Clearly mark Shut-off Valves

Page 35: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

35Physical Security v5.0

Water Threats

• Water Detection Sensors–Raised Floors

–Emergency Shut-off Valves

–Server room above ground level

• Water pipes not located above server rooms

Page 36: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

36Physical Security v5.0

Electrical Power

• Disruptions in electrical power can have a serious business impact.

• Goal is to have “clean and steady power.”– Dedicated feeders– Alternate power source– Access Controls– Secure breaker and transformer rooms.

Page 37: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

37Physical Security v5.0

Electrical Power Countermeasures

• Power Loss–Surge Suppressors

–UPS and UPS Testing

–Electrical Facilities separated from Data Center

–Generators

Page 38: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

38Physical Security v5.0

Electrical Power Considerations

Electric Power Controls – ‘clean power’– Have an Emergency Power Off (EPO) switch

that allows someone to shut down the power.– Install a power line monitor that detects and

records fluctuations in frequency and voltage.– Ensure there is enough backup power to

conduct an orderly shutdown to avoid data loss or device damage.

Page 39: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

39Physical Security v5.0

Electrical Power Outages

• Complete loss of power.– Blackout

• Prolonged loss of commercial power

– Fault • Momentary loss of power

Page 40: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

40Physical Security v5.0

Electrical Power Degradation

• Brownout – Intentional reduction of voltage by the utility

company for a prolonged period of time

• Sag/Dip– A short period of low voltage

• Surge – Sudden rise in voltage in the power supply

Page 41: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

41Physical Security v5.0

Electrical Power Degradation, cont.

• Transients – Line noise that is superimposed on the

supply circuit can cause a fluctuation in power.

• Inrush Current – The initial surge of current required when

there is an increase in power demand.• Electrostatic Discharge

– A power surge generated by a person or device contacting another device and transferring a high voltage shock.

Page 42: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

42Physical Security v5.0

Interference

• Noise – A natural occurrence that happens when unwanted signals are generated in circuits that are in close proximity. Typically, this disrupts the affected circuit. – Electromagnetic Interference (EMI)

• Caused by motors, lightning, etc.

– Radio Frequency Interference (RFI)• Created by components of electrical system• Caused by electric cables, fluorescent lighting,

truck ignition

Page 43: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

43Physical Security v5.0

Heating, Ventilation and Air Conditioning Issues

• HVAC computerized controls– Location– Access controls

• Appropriate maintenance of – Temperature– Humidity levels– Air quality

• Independence of the data center air conditioning system from the rest of the building.

• Documented maintenance procedures

Page 44: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

44Physical Security v5.0

Heating, Ventilation and Air Conditioning Practices

• HVAC–Temperature Controls Protection

–Emergency Detection System

–Auto Shutoff Mechanisms

–Proper Maintenance

Page 45: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

45Physical Security v5.0

Quick Quiz

• What are the goals of physical controls?

• What are examples of threats to physical security?

• What are the three key strategies for crime prevention through environmental design?

• What is the most important factor to remember when implementing physical security controls?

Page 46: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

46Physical Security v5.0

Section Summary

• The goals of physical controls are to prevent, delay, detect, assess, and appropriately respond to a physical intrusion.

• Natural or environmental, utility system, and human-made factors can all pose threats to physical security.

• The three key strategies for crime prevention through environmental design are territoriality, surveillance, and access control.

• The most important concept to remember when implementing physical security controls is to ensure the safety of people.

Page 47: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

47Physical Security v5.0

Layered Defense ModelSubtopics

• Perimeter and Building Grounds

• Building Entry Points• Inside the Building -- Building

Floors/Office Suites• Data Centers or Server Room

Security• Computer Equipment

Protection• Object Protection

Page 48: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

48Physical Security v5.0

Section Objectives

• Understand the ‘layered’ approach to physical security, from the outside perimeter to the inside of the building

• Describe boundary protection• List perimeter intrusion detection systems• Describe controls used inside the building• List the key controls for data center or

server room security

Page 49: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

49Physical Security v5.0

Layered Defense Model

• Approaching security through ‘layers’ of controls

• Multi-layered

• Starts with the perimeter, then building grounds, then building entry points, etc.

Page 50: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

50Physical Security v5.0

Perimeter and Building Grounds Boundary Protection

• Perimeter security controls are the first line of defense.

• Protective barriers can be either natural or structural.– Natural protective barriers offer terrains that

are difficult to cross, such as mountains, bodies of water, deserts, etc.

– Structural barriers are devices such as fences, gates, bollards, and facility walls.

Page 51: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

51Physical Security v5.0

Perimeter and Building Grounds Boundary Protection

Landscaping

• Shrubs or trees can provide a barrier or an entry point.

• Spiny shrubs make it harder for an intruder to cross the barrier.

Page 52: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

52Physical Security v5.0

Perimeter and Building Grounds Boundary Protection

Fences• Are used to enclose security areas and

designate property boundaries.• Should meet specific gauge and fabric

specifications. • High-security areas may need a “top

guard” (barb wire at the top). • Should meet certain height and location

provisions.

Page 53: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

53Physical Security v5.0

Perimeter and Building Grounds Boundary Protection

Fences• Fences must be checked

and repaired on a regular basis.

• Fence fabric must be securely attached to poles.

• Be sure that vegetation or adjacent structures cannot provide a “bridge” over the fence.

Page 54: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

54Physical Security v5.0

Perimeter and Building Grounds Boundary Protection

Gates

• The portions of a wall or fence system that control entrance and/or egress by persons or vehicles and complete the perimeter of the defined area.

Page 55: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

55Physical Security v5.0

Perimeter and Building Grounds Boundary Protection

Bollards• A rising post designed for

use in traffic control and protecting property premises.

• Provides security against vehicles ramming into, or stopping near buildings.

• Lighted bollards can be used for lighting controls along parks, paths, sidewalks, etc.

Page 56: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

56Physical Security v5.0

Perimeter and Building Grounds Boundary ProtectionSubtopics

Perimeter Intrusion Detection Systems

• Sensors that detect access into an area

Surveillance Devices

• Closed-Circuit Television (CCTV)

Page 57: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

57Physical Security v5.0

Perimeter and Building Grounds Boundary Protection

Perimeter Intrusion Detection Systems

• Photoelectric

• Ultrasonic

• Microwave

• Passive infrared (PIR)

• Pressure-Sensitive

Page 58: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

58Physical Security v5.0

Perimeter and Building Grounds Boundary Protection

Closed Circuit Television (CCTV)

• A television transmission system that uses cameras to transmit pictures by a transmission medium to connected monitors.

• The transmission media can use wired or wireless technologies.

Page 59: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

59Physical Security v5.0

Perimeter and Building Grounds Boundary Protection

CCTV Levels• Detection - the ability to detect the presence

of an object.• Recognition - the ability to determine the

type of object.• Identification - the ability to determine the

object details.

Page 60: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

60Physical Security v5.0

Perimeter and Building Grounds Boundary Protection

CCTV - 3 Main Components

• Camera– (e.g., Fixed or Zoom)

• Transmission Media– (e.g., coaxial cable, fiber

optic cable, or wireless)

• Monitor

Page 61: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

61Physical Security v5.0

Perimeter and Building Grounds Boundary Protection

CCTV - Other Equipment• Camera Tube• Pan and Tilt Units• Panning Device• Mountings• Switchers/Multiplexers• Remote Camera Controls

• Infrared Illuminators• Time/Date Generators• Videotape or Digital

Recorders• Motion Detectors• Computer Controls

Page 62: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

62Physical Security v5.0

Perimeter and Building Grounds Boundary Protection

CCTV - Key Success Items• Understand the facilities total surveillance

requirements.• Determine the size of the area to be monitored -

depth, height, and width - to know what size camera lens is needed.

• Lighting is important - different lamps and lighting provide various levels of effectiveness.– ‘Contrast’ between the object and background

Page 63: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

63Physical Security v5.0

Perimeter and Building Grounds Boundary Protection

Lighting – is the illumination of a locale, typically by artificial means such as light fixtures or lamps.– A consistent level of light supplying reasonably good

visibility needs to be available.

• Features:– Good lighting is one of the most successful crime

preventive measures.– When used properly, light discourages unlawful activity,

improves natural observation, and decreases fear. – Typically used with other controls, such as fences,

patrols, alarm systems.

Page 64: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

64Physical Security v5.0

Perimeter and Building Grounds Boundary Protection

Types of Lighting• Continuous lighting

– Glare projection lighting

– Flood lighting• Trip lighting• Standby lighting• Emergency lighting

Page 65: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

65Physical Security v5.0

Layered Defense ModelSubtopics

• Perimeter and Building Grounds

• Building Entry Points• Inside the Building -- Building

Floors/Office Suites• Data Centers or Server Room

Security• Computer Equipment

Protection• Object Protection

Page 66: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

66Physical Security v5.0

Building Entry Point Protection

Locks• Most accepted and used physical security

device• Considered delay devices and not foolproof

bars to entry - they are easily defeated• All lock types are subject to force and special

tools that can be used to gain entry• Should be just one aspect of many physical

security controls

Page 67: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

67Physical Security v5.0

Building Entry Point Protection

Lock Components

• Lock Body (Cylinder)– Bolt

• Strike

• Key

Page 68: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

68Physical Security v5.0

Building Entry Point Protection

Lock Types• Combination Locks

– Uses a sequence of numbers in a specific order

• Deadbolt Locks– A separate bolt not operated by

the primary door handle is inserted into the frame of the door for added security.

Page 69: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

69Physical Security v5.0

Building Entry Point Protection

Lock Types

• Keyless Locks– Push-button (cipher) locks have buttons that

are pushed in sequence to open the locks.

• Smart Locks– Permit only authorized people into certain

doors at certain times. An example is a magnetic stripe card that is time-sensitive.

Page 70: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

70Physical Security v5.0

Building Entry Point Protection

Locks• Lock Picking

– Picks– Tension wrench

• Locks are “pick-resistant,” not “pickproof”

Page 71: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

71Physical Security v5.0

Building Entry Point Protection

Locks - Security Measures• Lock and key control system• Key control procedures must be

documented and followed– Procedures for issue, sign out, inventory,

destruction, and lost keys

• Combinations must be changed at specified times and under specified circumstances.

Page 72: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

72Physical Security v5.0

Building Entry Point Protection

Guard Stations• Security forces

(guards) can provide a deterrence to unauthorized entry. In some cases, may also prevent unauthorized entry.

Page 73: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

73Physical Security v5.0

Building Entry Point Protection

Card Access Controls or Biometric Systems

• Smart cards, Magnetic Stripe cards, Proximity Cards, etc.

• Fingerprint, retina scans, signature dynamics, voice recognition, hand geometry, etc.

Page 74: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

74Physical Security v5.0

Layered Defense ModelSubtopics

• Perimeter and Building Grounds

• Building Entry Points• Inside the Building -- Building

Floors/Office Suites• Data Centers or Server Room

Security• Computer Equipment

Protection• Object Protection

Page 75: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

75Physical Security v5.0

Inside the Building - Building Floors, Office Suites, Offices

• Compartmentalized Areas

• Support System Controls

• Fire Protection

• Intrusion Detection Systems

Page 76: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

76Physical Security v5.0

Inside the Building - Building Floors, Office Suites, Offices

Compartmentalized Areas

• Defines a location where sensitive equipment is stored and where sensitive information is processed.

• Must have a higher level of security controls.

• To be effective, they need an appropriate access control system.

Page 77: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

77Physical Security v5.0

Inside the Building - Building Floors, Office Suites, Offices

Intrusion Detection Systems

Can be installed on:• Windows, • Doors, • Ceilings, • Walls, or • Any other entry points such as ventilation openings

or air conditioning openings.

Page 78: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

78Physical Security v5.0

Inside the Building - Building Floors, Office Suites, Offices

Intrusion Detection SystemsDetect a change in:• Electrical circuits• Light beams• Sounds• Vibrations• Motion• Capacitance due to penetration of an

electrostatic field

Page 79: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

79Physical Security v5.0

Layered Defense ModelSubtopics

• Perimeter and Building Grounds

• Building Entry Points• Inside the Building -- Building

Floors/Office Suites• Data Centers or Server Room

Security• Computer Equipment

Protection• Object Protection

Page 80: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

80Physical Security v5.0

Data Center or Server Room Security

Walls

• To the extent possible, walls should not form part of an external building.

• Walls should extend from the floor to the underside of the above floor slab (slab to slab).

Page 81: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

81Physical Security v5.0

Data Center or Server Room Security

Access Controls• Depending on the sensitivity of the information,

and value of the equipment, electronic access controls may need to be installed– Smart Cards– Biometric Devices– Locks

Page 82: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

82Physical Security v5.0

Layered Defense ModelSubtopics

• Perimeter and Building Grounds

• Building Entry Points• Inside the Building -- Building

Floors/Office Suites• Data Centers or Server Room

Security• Computer Equipment

Protection• Object Protection

Page 83: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

83Physical Security v5.0

Computer Equipment Protections

• Portable Device Security– Involves protecting the

device, protecting the data on the device, and keeping the security controls easy for the user.

Page 84: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

84Physical Security v5.0

Computer Equipment Protections

• Portable device security includes items such as:– Locking mechanisms for docking stations– Tracing software– Audible motion alarm – Encryption software– Constant control procedures– Inventory system– Anti-virus software

Page 85: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

85Physical Security v5.0

Layered Defense ModelSubtopics

• Perimeter and Building Grounds

• Building Entry Points• Inside the Building -- Building

Floors/Office Suites• Data Centers or Server Room

Security• Computer Equipment

Protection• Object Protection

Page 86: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

86Physical Security v5.0

Object Protection

• Objects are placed inside security containers such as safes, vaults, or locking file cabinets.– Should be theft-resistant and fire-

resistant.– Steel containers with a locking device.– Create good lock combinations, change

them frequently, and monitor the distribution.

Page 87: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

87Physical Security v5.0

Quick Quiz

• What is closed circuit television?• What are examples of building entry

point protection?• What are some of the key controls for

data center or server room security?

Page 88: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

88Physical Security v5.0

Section Summary

• Closed circuit television is a television transmission system that uses cameras to transmit pictures by a transmission medium to connected monitors.

• Doors, windows, locks, guard stations, card access controls, and biometric systems are examples of building entry point protection.

• Walls, doors, support systems, and access controls are some of the key controls for data center or server room security.

Page 89: © Copyright 2005 (ISC) 2® All Rights Reserved. 1 Physical Security v5.0 Physical Security

© Copyright 2005 (ISC)2® All Rights Reserved.

89Physical Security v5.0