Professional Documents
Culture Documents
The physical measures and their associated procedures to safeguard and protect against:
Damage Loss Theft
Introduction
Primary consideration in physical security is that nothing should impede life safety goals.
Ex.: Dont lock the only fire exit door from the outside.
Safety: Deals with the protection of life and assets against fire, natural disasters, and devastating accidents. Security: Addresses vandalism, theft, and attacks by individuals.
Definition: Threat
Any indication, circumstance or event with the potential to cause:
Loss of or Damage to an Asset Personal Injury Loss of Live
Threat Types
Natural / Environmental
Earthquakes, floods, storms, Tsunami, fires, smoke, snow Consequence of Natural Phenomenon Normally not preventable
Examples of Threats
Emergencies
Fire and Smoke Building Collapse or Explosion Utility Loss (Power, AC, Heat) Water Damage (Broken Pipes) Toxic Materials Release
Natural Disasters
Earth Movement (Earthquakes or Mudslides) Storm Damage (Snow, Ice, Floods, Hurricanes)
Human Intervention
Sabotage Vandalism War Strikes
Site Location
Security Should include WHERE the building is and HOW it should be built: Choosing a Secure Site
Visibility Usually low visibility is the rule to follow. What types of neighbors and markings on the building? Local Considerations Near hazardous waste dump? In flood control plain? Local crime rate, riots, strike-prone area? Natural Disasters Weather-related problems, tornados, flooding, heavy snow, earthquake zone
WALLS
All walls MUST have an acceptable Fire Rating. Be Floor to Ceiling Any Closets or Rooms that Store Media must also have Fire Rating
CEILINGS
Be aware if they are WEIGHT BEARING and their Fire Rating
RAISED
Concerned with Fire Rating, Electrical Conductivity (Grounding against static electricity) Must employ non-conducting surface material in data center
Fire Rating Equal to Walls Emergency Exits Must Be Clearly Marked, Monitored, or Alarmed Electrical Doors on Emergency Exits Should Revert to Disabled State if Power Outage Occurs For Safe Evacuation TIP!! Personnel Safety ALWAYS Takes Precedence! Doors Can Be Guarded During an Emergency
Wire Mesh Layers Bomb Blast Film (Prevent Viewing In and Reinforce Window) Bullet Resistant Windows Glass Breakage Sensors Usually Not Accepted in Data Center
If Installed, Should Be Translucent and Shatterproof
Procedural Controls
Guard Post Checking and Escorting Visitors on Site Managing Deliveries to the Site
Building-Specific
16
Emergency Procedures
Should be Clearly Documented and Readily Accessible Copies Stored Offsite in the Event of a Disaster Updated Periodically
Audit Trails
These are known as DETECTIVE rather than PREVENTIVE
Date and Time of Access Attempt Whether the Attempt was Successful or Not Where the Access was Granted (i.e., which door) Who Attempted the Access Who Modified the Access Privileges at the Supervisor Level Can Send Alarms or Alerts if Required
Emergency Procedures
Should Include the Following:
Emergency System Shutdown Procedures Evacuation Procedures Employee Training, Awareness Programs, and Periodic Drills Periodic Equipment and Systems Tests
Post-Employment Procedures
Exit Interview, Removal of Network Access, Return of Computers, etc.
Electrical Power
Disruptions in Electrical Power Can Have a Serious Business Impact Goals:
Clean and Steady Power Excellent Power Quality Dedicated Feeders Alternate Power Source Access Controls Secure Breaker and Transformer Rooms
Design Considerations:
ANOMOLIES
Brownout, Blackout, Fault, etc.
Electrical Noise
Def: Random Disturbance Interfering With Devices
Electromagnetic Interference (EMI)
Caused by Motors, Lightning, etc.
Electrical Anomalies
Electrical Event Blackout Fault Brownout Sag Definition Total loss of power Momentary loss of power Prolonged drop in voltage (up to 10%) Short drop in voltage
Inrush
Spike Surge
FIRE PROTECTION
1. Fire Prevention 2. Fire Detection 3. Fire Suppression
Fire Triangle
A FIRE Needs These Three Elements to Burn Fire Fighting Removes One of These Three Elements OR By Temporarily Breaking Up the Chemical Reaction
Fire Prevention
Use Fire Resistant Materials for Walls, Doors, Furnishings, etc. Reduce the Amount of Combustible Papers Around Electrical Equipment Provide Fire Prevention Training to Employees
REMEMBER: Life Safety is the Most Important Issue!
Conduct Fire Drills on All Shifts So that Personnel Know How to Exit A Building
Fire Detection
Ionization-type Smoke Detectors
Detect Charged Particles in Smoke
Flame Actuated
Senses Infrared Energy of Flame or Pulsating of the Flame Very FAST Response Time, Expensive
Combinations are Usually Used for The Best Effectiveness in Detecting a Fire
Extinguishing Method
Water, Foam
A B
C D K
Dry Powder (May require total immersion or other special techniques) Wet Chemicals
Fire Suppression
Carbon Dioxide (CO2)/ Halon/ FM200, Foam, Inert Gas and Dry Power Extinguishers DISPLACE Oxygen to Suppress a Fire Water Suppresses the Temperature Required to Sustain a Fire
Dry Pipe
Preaction
Combines Both Dry and Wet Pipes Water Released into Pipe First Then After Fuse Melts in Nozzle the Water is Dispersed
HVAC Issues
Are Computerized Components Involved? Does It Maintain Appropriate Temperature and Humidity Levels? Air Quality?
Ideal Temperature = 70 to 74 F Ideal Humidity = 40% to 60%
Perimeter Protection
Perimeter Security Controls are the First Line of Defense Protective Barriers Natural or Structural
Natural Barriers
Terrains That are Difficult to Cross Landscaping (Shrubs, Trees, Spiny Shrubs)
Structural Barriers
Fences, Gates, Bollards, Facility Walls
Fences
Know These Fencing Heights:
3 ft 4 ft High 6 ft 8 ft High 8 ft High with 3 Strands of Barbed Wire Deters Casual Trespassers Too Hard to Climb Easily
Deters Intruders
3 Types of Fencing
Chain Link Barbed Wire Barbed Tape or Concertina Wire
Chain Link
Fences (2)
6 Feet Tall (Excluding Top Guard) 8 Feet Tall (with Top Guard) 2 inch Openings or Less Reach within 2 Inches of Ground or On Soft Ground It Is Below the Surface Be Sure Vegetation or Adjacent Structures Do Not Bridge Over the Fence
Surveillance Devices
Closed-Circuit Television (CCTV)
Motion Detectors
3 Categories
Wave Pattern Generates a Frequency Wave Pattern. If Pattern is Disturbed as it is Reflected Back to its Receiver (low, ultrasonic or microwave range) Capacitance Monitor an Electrical Field Around an Object. If Field is Disturbed the Alarm is Triggered. Used for Spot Protection. Audio Detectors Monitor for any Abnormal Sound Wave Generation. (Lots of False Alarms)
CCTV
Def: A Television Transmission System That Uses Cameras to Transmit Pictures To Connected Monitors CCTV Levels:
Detection: The Ability to Detect the Presence of an Object Recognition: The Ability to Determine the Type of Object (animal, blowing debris, crawling human) Identification: The Ability to Determine the Object Details (person, large rabbit, small deer, tumbleweed)
CCTV Components
Camera
Fixed, Zoom Pan & Tilt
Transmission Media
Coax Cable Fiber Cable Wireless
Monitor
Lighting
Provides a Deterrent to Intruders Makes Detection Likely if Entry Attempted Should be Used With Other Controls Such as Fences, Patrols, Alarm Systems, CCTV
Access Control
Card Access
Smart Cards Mag Stripe Cards Proximity Cards
Biometrics
Fingerprint Retina or Iris Scans Hand Geometry Signature Dynamics
Prepared by Ernie Hayden, CISSP CEH 55
Locks
Tip: Locks are Considered DELAY Devices Only All Locks Can Be Defeated By Force and/or the Proper Tools Locks Must Never Be Considered a StandAlone Method of Security
Locks (2)
Types of Locks
Key Locks Combination Locks
Key Locks
Key-in-Knob or Key-in-Lever (Cylindrical Lockset) Only for Low Security Apps Dead Bolt Locks or Tubular Dead Bolts Good for Storerooms, Houses Mortise Locks (Lock Case is Recessed or Mortised into the Edge of Door) Low Security Apps Padlocks
Combination Locks
Combinations Must Be Changed at Specific Times and Under Specific Circumstances
Smart Locks
Permit Only Authorized People Into Certain Doors at Certain Times
E.g., Magnetic Stripe Card that is Time Sensitive
58
Use as Few Master Keys as Possible Issue Keys on a Need-to-Go Basis Remember Keys are a Single-Factor Authentication Mechanism That Can Be Lost, Stolen, or Copied.
(Use 2-Factor Methods for More Secure Spaces)
Compartmentalized Area
Def: Location Where Sensitive Equipment is Stored and Where Sensitive Information is Processed Must Have a Higher Level of Security Controls
60
Walls
Data Center
Access Controls
Depending Upon Sensitivity of the Information and Value of Equipment, Electronic Access Controls May Need to be Installed
Examples:
Locking Cables for Docking Stations Tracing Software Audible Motion Alarm Encryption Software PIN Protection for PDAs Inventory System
Alarm Systems
1. Local Alarm Systems Alarm Sounds Locally and Must be Protected from Tampering and Audible for at Least 400 Feet 2. Central Station Units Monitored 7x24 and Signaled Over Leased Lines Usually within <10 Minutes Travel Time (Private Security Firms) 3. Auxiliary Station Systems Systems that Ring at Local Fire or Police Stations
Physical Summary
Physical and Procedural Countermeasures:
Provide Identification and Authentication Authorization (Access Control) Accountability Provide Physical Contingency Resources and Alternate Procedures
Organized in a DEFENSE IN DEPTH Strategy Effectiveness Relies on Knowledge, Skills and Awareness of Staff