Physical and Environmental Security Controls Flashcards
Physical Controls
- Physical controls are the first line of defence in securing an infrastructure.
- No matter how strong technical controls are, if an adversary gains physical access to a server or premises, the security is compromised.
- Physical security is often overlooked or underestimated, with the misconception that technology can solve all security problems.
- An open door to premises is equivalent to not having a password to secure a computer.
- Attackers will always target the easiest option, so physical access to premises can lead to unauthorized network access.
- Physical controls are essential to prevent unauthorized entry, protect hardware and equipment, and safeguard against theft or tampering.
- Examples of physical controls include access control systems, surveillance cameras, locks, alarms, and secure data centre facilities.
- Organizations must prioritize physical security measures to ensure the overall security of their cloud infrastructure and data.
Which of the following statements best describes the importance of physical controls in cloud computing?
A) Physical controls are not necessary in cloud computing since all security measures are handled through technical controls.
B) Physical controls are the first line of defence in securing an infrastructure and help prevent unauthorized access to premises and equipment.
C) Physical controls are optional and can be overlooked if strong technical controls are in place.
D) Physical controls are only relevant for on-premises infrastructure and not applicable to cloud environments.
B) Physical controls are the first line of defence in securing an infrastructure and help prevent unauthorized access to premises and equipment.
This statement highlights the importance of physical controls in ensuring the security of cloud infrastructure by protecting against physical threats.
Which of the following is an example of a physical control in cloud computing?
A) Firewall configuration and management
B) Intrusion detection system (IDS)
C) Encryption of data at rest
D) Biometric access control system for a data centre entrance
D) Biometric access control system for a data centre entrance
This option represents a physical control as it involves the use of biometric authentication (such as fingerprint or iris scan) to regulate access to the physical location where the cloud infrastructure is housed.
Objectives of Physical Security
- The main objectives of physical security controls are to protect assets from damage, loss, and theft.
- People safety is always paramount, as people should be considered the most valuable asset.
- Damage and loss can both apply to people assets, emphasizing the importance of prioritizing people’s safety.
- Physical security aims to provide protection against various threats, including unauthorized intruders, fire, flood, and loss of essential utilities (e.g., power).
- Physical security controls also aim to prevent damage to or loss of assets through theft.
- In summary, the objectives of physical security are asset protection, people safety, and safeguarding against unauthorized access, fire, flood, utility loss, and asset theft.
Which of the following is NOT one of the main objectives of physical security controls?
A) Protecting assets from damage
B) Ensuring people safety
C) Preventing unauthorized access
D) Enhancing network security
D) Enhancing network security
The objectives of physical security controls primarily focus on protecting assets from damage, ensuring people safety, and preventing unauthorized access. Enhancing network security falls under the realm of information security, which is a separate discipline from physical security. Physical security measures are primarily concerned with protecting physical assets and the safety of individuals within a physical environment, while network security deals with securing digital networks, systems, and data.
Which of the following is considered one of the primary threats that physical security controls aim to protect against?
A) Data breaches
B) Social engineering attacks
C) Fire and flood
D) Malware infections
C) Fire and flood
Physical security controls aim to protect against various threats, including unauthorized intruders, fire, flood, loss of essential utilities, and asset theft. Fire and flood pose significant risks to physical assets, infrastructure, and the safety of individuals within a premises. Physical security measures such as fire detection systems, sprinkler systems, fireproof storage, and flood barriers are implemented to mitigate the potential damage and loss caused by these natural disasters. While data breaches, social engineering attacks, and malware infections are important concerns, they primarily fall within the scope of information security rather than physical security.
Facility Security
- The security measures required for securing premises depend on the type of facility.
- Stand-alone buildings in their own grounds require different security measures compared to offices in multi-storey buildings.
- The starting point for physical security in a stand-alone building is the grounds perimeter, which can be protected by a fence or wall.
- The type of fence or wall used determines whether it functions as a deterrent or a preventative control.
- A higher fence, such as a 2-meter wire mesh fence topped with razor wire and electrified, provides a more serious deterrent and is considered a preventative control.
- However, determined intruders may still find ways to overcome the perimeter barrier.
- Additional controls for perimeter defence can include lighting, CCTV surveillance, and even guard dogs.
- The presence of multiple controls may indicate that the property contains valuable assets, potentially making it a more attractive target.
- High-value targets may have multiple fence or wall boundaries to increase the difficulty for intruders, similar to the layered Défense of castles.
- Access portals or entry points within the perimeter need to be protected as well.
- Multiple layers of security are designed to restrict access to information assets, with the server room being the equivalent of the castle’s keep.
In summary, facility security involves securing the perimeter, implementing deterrent and preventative controls, considering multiple layers of Défense, and protecting access portals within the premises.
Which of the following is a key objective of facility security?
A) Enhancing network performance
B) Minimizing operational costs
C) Protecting premises and assets
D) Ensuring regulatory compliance
C) Protecting premises and assets
Facility security primarily focuses on safeguarding the premises and assets within a facility. This includes implementing physical security measures to prevent unauthorized access, damage, loss, and theft. Enhancing network performance (choice A) falls under the scope of network management and optimization, not specifically facility security. Minimizing operational costs (choice B) is an objective that relates to business efficiency and cost management, but it is not directly tied to facility security. Ensuring regulatory compliance (choice D) is an important consideration, but it is a broader objective that encompasses various aspects of business operations, including facility security. Protecting premises and assets is the primary objective of facility security.
Which of the following is a potential negative aspect of implementing multiple security controls within a facility?
A) Increased deterrence for potential intruders
B) Indication of valuable assets within the facility
C) Enhanced safety measures for employees
D) Improved regulatory compliance standards
B) Indication of valuable assets within the facility
Implementing multiple security controls within a facility can inadvertently indicate the presence of valuable assets. While having multiple security controls may enhance security and deter potential intruders (choice A), the downside is that it may also draw attention to the fact that there are valuable assets within the facility. This can make the facility a more attractive target for intruders. Enhanced safety measures for employees (choice C) are generally seen as a positive outcome of implementing security controls. Improved regulatory compliance standards (choice D) can also be a positive result, but it is not directly related to the potential negative aspect of indicating valuable assets.
Manned Perimeter
- Manned perimeter security involves deploying security guards at the perimeter and gateways of a facility.
- Security guards can make judgements, patrol the perimeter, control personnel, monitor CCTV, and act as a deterrent.
- Guard dogs can detect human presence, act as a deterrent, and detect things that humans may miss.
- Additional security controls for external areas can include physical intrusion detection systems.
- Lighting is commonly used as a deterrent control to discourage potential intruders.
- Proper installation and effectiveness of lighting are essential to prevent dark or shadow areas from being exploited.
- External lighting can be utilized in different ways, such as flood lighting to cover all areas, trip lighting activated by sensors, projection lighting to blind intruders at the top of fences or walls, and moveable lighting to track moving objects.
In summary, a manned perimeter with security guards and guard dogs provides various benefits, including judgements, patrols, personnel control, monitoring, and detection capabilities. Lighting serves as a deterrent and can be implemented through flood lighting, trip lighting, projection lighting, and moveable lighting. The effective deployment of these measures helps enhance facility security.
Which of the following is a benefit of having manned security guards at the perimeter of a facility?
A) Efficient utilization of lighting resources
B) Improved network performance monitoring
C) Enhanced control over personnel
D) Increased reliance on physical intrusion detection systems
C) Enhanced control over personnel
Manned security guards at the perimeter provide enhanced control over personnel by monitoring and managing access, ensuring only authorized individuals enter the facility. This improves security and accountability. The other options are not direct benefits of having manned security guards.
Securing the Premises
- Minimize the number of physical entrances to improve control over access
- External doors should be robust, solid, and have concealed or tamper-proof hinges
- Doors with glass should be laminated or wired to prevent easy breakage.
- Avoid placing windows next to doors to prevent intruders from breaking the window to access the door handle.
- Different types of locks include ward locks, tumbler locks, digi-locks, smart locks, and combination locks.
- Protect door keys or fobs to prevent unauthorized access.
- Physical access control systems use locks and technology to control and monitor access to the facility.
- CCTV provides oversight of entry, and smart locks with swipe cards record entry and exit digitally.
- Security guards can provide manual oversight of physical entry and assist in case of access problems.
- Inside the facility, CCTV and motion detectors can monitor movement and alert security or law enforcement in case of intruders.
- Authorized staff should wear ID badges displaying at least a photograph and name, which can also function as an authentication mechanism.
In summary, securing the premises involves minimizing entrances, using robust doors and locks, implementing physical access control systems, monitoring access with technology like CCTV and motion detectors, and ensuring authorized personnel wear ID badges for identification and movement control within the facility.
Which of the following is a recommended practice for securing external doors of a facility?
A) Installing windows next to the doors for increased visibility
B) Using solid doors made of non-robust materials
C) Concealing hinges or using tamper-proof hinges
D) Using only traditional key locks without additional security measures
C) Concealing hinges or using tamper-proof hinges
Concealing hinges or using tamper-proof hinges is a recommended practice for securing external doors of a facility. By doing so, it prevents intruders from attempting to remove the hinge pins and gain unauthorized access. Installing windows next to the doors (choice A) may provide visibility but can also pose a security risk. Using non-robust doors made of non-robust materials (choice B) would not offer sufficient protection. Using only traditional key locks without additional security measures (choice D) may not provide adequate security against potential threats.
What is the purpose of a physical access control system in facility security?
A) Monitoring employee productivity within the premises
B) Restricting access to the facility based on time of day
C) Detecting physical threats such as fire or flood
D) Controlling and recording individuals’ passage through openings
D) Controlling and recording individuals’ passage through openings
The purpose of a physical access control system in facility security is to control and record individuals’ passage through openings. It enables organizations to manage and monitor access to the facility by using various methods such as locks, key cards, biometrics, or smart locks. The system helps enforce security policies, track and log entry and exit, and restrict access based on authorized privileges. Monitoring employee productivity (choice A), restricting access based on time of day (choice B), and detecting physical threats (choice C) are not the primary functions of a physical access control system.
Equipment Protection
- Objectives of physical security include preventing loss or theft of physical assets, including PCs, laptops, and technical equipment.
- Theft can occur from both external threat actors and internal staff, with greater threats to more portable items.
- Maintain an up-to-date comprehensive asset register to record physical assets, their owners, and locations.
- All equipment should have tamper-proof asset tags affixed.
- Secure servers in locked racks within a locked server room.
- Secure laptops with cables and locks, and networking equipment in cabinets or wiring closets accessible only to authorized personnel.
- Establish a physical security policy that governs the movement of equipment on and off-site.
- Control what equipment can be taken off-site, considering staff working from home, and ensure the asset register reflects the location of assets.
In summary, protecting equipment involves maintaining an asset register, securing equipment with tamper-proof tags and physical restraints, controlling access to server rooms and networking equipment, and establishing a physical security policy for equipment movement.