101

Click here to load reader

CISSP week 26

Embed Size (px)

Citation preview

Page 1: CISSP week 26

Physical Security

Domain 10 CISSP Official CBK 3rd EditionPages 1256-1362

Jem JensenTim JensenStaridLabs

Page 2: CISSP week 26

Physical Security Program: Purpose

• Designed to prevent the interruption of operations and provide for the security of information, assets, and personnel.• Risks include:• Violence and crime• International Terrorism• Environmental Damage• Energy Disruptions• Pandemics

Page 3: CISSP week 26

The Security Survey

• The first step is to determine the protection objectives:• Threat Definition• Target Identification• Facility Characteristics.

• Goal is to mitigate justified risks and not waste money on ineffective security.

Page 4: CISSP week 26

Target Identification

• The first step is to identify what assets need to be protected.• Set a prioritization for assets.• Assets can be personnel, property, equipment, or information.• Identify the impact and consequences of an asset loss.

Page 5: CISSP week 26

Facility Characteristics

• Several security professionals should be included in a facility walkthrough. The more eyes and the more experience the better.• Overnight security guards get bored and wander around all night, as

such they are usually the best source for identifying weaknesses.

Page 6: CISSP week 26

American Institute of ArchitectsList of Key Security Concerns

• Facility security control during and after hours of operation

• Personnel and contract security policies and procedures

• Personnel screening• Site and building access control• Video surveillance, assessment, and archiving.• Natural surveillance opportunities.• Protocols for responding to internal and

external security incidents.• Degree of integration of security and other

building systems.• Shipping and receiving security

• Property Identification and tracking• Proprietary information security• Computer network security• Workplace violence prevention• Mail screening operations, procedures, and

recommendations• Parking lot and site security• Data center security• Communications security• Executive protection• Business continuity planning and

evacuation procedures

Page 7: CISSP week 26

Vulnerability Assessment

• The assessment should be done within the context of the defined threats and the value of the organization’s assets.• Each risk (front entrance, receptionist, etc) should have it’s own

vulnerability level. (Very High, High, Medium High, Medium….)• The cost of your protective measures shouldn’t be more expensive

than the assets your protecting.*• Caveats*

• Laws/Regulations• Compliance• Single Loss vs Annul Rate of Occurrence (SLE/ARO)

Page 8: CISSP week 26

Site Planning

• Again, the goal of this whole process is the protection of life, property, and operations.• Countermeasures should be appropriate and effective to reduce the risk.• Must balance employee convenience and a secure facility.• Security shouldn’t be sacrificed for convenience, but a lot can be done to make the

user’s life easier.• Security is always easier to setup from the beginning. Employees resist change and

push back every time things are changed. As such security should be done right from the beginning, and only updated when necessary, not on a whim.

• The movement of people and materials through a facility is determined by the design for access, delivery, and parking systems.

• Systems should be designed to maximize efficiency while minimizing conflicts between entry and exit of vehicles and pedestrians.

Page 9: CISSP week 26

Roadway Design

• Normal street design is to minimize travel time and maximize safety. • For security, roadways can be designed to minimize vehicle velocity

and to use the roadway as a protective measure.• Straight line approaches should not be used. This allows a vehicle the

opportunity to gather the speed necessary to ram and penetrate the buildings.• Approaches should be parallel to the perimeter with a barrier between the

road and building: earthen berms, high curbs, trees, etc.• Existing streets can be retrofitted with barriers, bollards, swing gates, etc.• Measures should be applied to keep vehicles from departing the roadway and

bypassing the countermeasures.

Page 10: CISSP week 26

Glasgow Airport

Page 11: CISSP week 26

Car drives into Sears

Page 12: CISSP week 26

Carbomb in Bagdad

Page 13: CISSP week 26

Remember…build a better defense and the universe builds a better idiot…

Page 14: CISSP week 26

Defenses

Page 15: CISSP week 26

Less effective vehicle deterrents

Page 16: CISSP week 26

Crime Prevention through Environmental Design (CPTED)• Provides direction to solve challenges of crime with organization

(people), mechanical (technology and hardware), and natural design (architecture and circulation flow).• Protection can be provided through aesthetically pleasing features

such as landforms, water, and vegetation.• Thick vegetation should not be directly adjacent to a building and

thick ground cover over 4 inches tall could be a disadvantage.• Facility should be designed with a single point of entrance for

guests/untrusted visitors. A receptionist should be available at this entrance.

Page 17: CISSP week 26

Windows

• Windows are vulnerable and common entry points.• Home windows shatter and cause hazardous conditions. (Note on window

safety)• Buildings should be designed so that in the event of an explosion shattered

glass is mitigated. (Bushes, walls, special types of glass, secure door frame, secure anchoring of frame to structure)• Windows should ideally not be directly adjacent to doors. This prevents a

broken window allowing access to the door lock from the inside.• Laminated glass, grills, screens, mesh etc can protect windows.• Windows on ground level should not have the ability to be opened and

should have bars and alarm systems.

Page 18: CISSP week 26

Types of Glass

• Annealed: Standard Glass• Tempered Glass: Impact Resistant• Wired glass: Wire mess imbedded in glass offering limited protection• Laminated glass: Very shatter resistant. Still breakable, but shards are

held in place.

Page 19: CISSP week 26

(video removed)

Page 20: CISSP week 26

(video removed)

Page 21: CISSP week 26

(video removed)

Page 22: CISSP week 26

Glass Break Sensors

• Sensors can be installed to detect glass breaking.• Types:• Acoustic (Listens for sound wave matching frequency of broken glass)

• Crap• Shock (Identifies shock wave when glass is broken)

• Also crap• Dual mode (Acoustic and Shock required for alarm)

• Less crap

Page 23: CISSP week 26

Garages

• Primary risks: Crime and vehicles hitting pedestrians• Use signs to direct traffic and CCTV cameras to monitor for incidents.• Bright lights reduce both risks

• 10-12 foot candle over parked cars• 15-20 foot candles in walking and driving aisles.

• Exterior lights should be 12 feet above ground and should point downward.• Parking structure should be white to reflect light.• Elevators and walkways should empty into the lobby, not into the

secure areas.

Page 24: CISSP week 26

Location ThreatsNatural Disasters

• Hurricane winds can exceed 155 MPH• Tornado winds can reach 300 MPH• Earthquakes shake things• Floods…flood things…

Page 25: CISSP week 26

Man-made threats

• FIRE! FIRE!• Fires cause damage due to heat, smoke, and water from suppression

systems.• Fire systems should be protection water systems should be protected

from single points of failure.• Incoming water line should be encased, buried, or located 50 feet

from high risk areas.

Page 26: CISSP week 26

Fire Extinguisher Classes

Page 27: CISSP week 26

Utility Concerns:Electrical

• Electric panels, conduits, and switchgear should be distributed throughout the building to avoid single points of failure.• Emergency generators should be located away from loading docks,

entrances, and parking areas. Preferably on a roof, protected level, or protected interior area.• Generator fuel storage should be located away form loading docks,

entrances, and parking areas. Access should be restricted and protected including locking caps and seals.

Page 28: CISSP week 26
Page 29: CISSP week 26
Page 30: CISSP week 26
Page 31: CISSP week 26

Communications

• At least two phone lines on separate systems is good in case of emergency.• If using VOIP, run at least 1 telephone landline to the security guard desk as a

backup.

• Cell phones are relatively cheap and should be provided to critical personnel.• Maintain a phone list of critical employees.• Setup a base radio and add a portable radio to each floor for

emergency internal communications.

Page 32: CISSP week 26

Utilities

• When possible protect utilities by placing them underground• Protect drinking water from contamination• Don’t provide signage saying “Critical power area” or “Single point of

failure for all of our power, water, and heat. Don’t hit with car!”• Locate fuel storage tanks and operations buildings down slope and at

least 100 feet from buildings.• Utility systems should be at least 50 feet from loading docks, front

entrances, and parking areas.

Page 33: CISSP week 26

Primary Purpose of Security!To protect personnel(people),assets(buildings, items), and information(10010101011101) from death, destruction, or harm.

Page 34: CISSP week 26

Workers comp costsInsurance rate per $100 of

payroll

Page 35: CISSP week 26

Perimeter security

• Perimeter security is made up of several zones. The more zones, the more defense-in-depth and the better your security.• Each zone can have different

controls.• Security controls should be added

with care, using risk, vulnerability, and threat assessment to balance security and risk.

Page 36: CISSP week 26

Physical Security elements(Dodge, dip, dive, duck, and

dodge)• Deter

• Visible security will make adversaries reconsider. If you’re the secure bank with a sniper on the roof and a turret mounted machine gun operated by an annoyed robot, and the bank 2 blocks over (out of sniper sight) has an electric alarm from Radioshack and you both have equal assets that can be stolen…guess who’s going to be chosen.

• Detect• Detection devices allow prompt notification that a break in has occurred. These can be cameras, motion sensors,

infrared sensors, glass sensors, etc.

• Delay• This is the key to physical security. Your protections and detection components are attempting to alert and delay

adversaries so long as is necessary for police or security to arrive. Glass windows only need to last 15 minutes of pounding if a guard walks by every 15 minutes. Even that’s overkill since the guard would be able to hear several minutes before and after while he’s in the vicinity. A safe only has to last long enough for a response, etc.

• Respond• A response force must be told that an unauthorized entry has been attempted. Police, security, mercenaries, the

sniper, etc.

Page 37: CISSP week 26

Critical components to protect

• Emergency generator: includes fuel systems, water supply, sprinklers, etc.• Fuel storage• Telephone and switchgear• Fire pumps• Building Control Centers• UPS power supplies• HVAC systems• Elevator machinery• Elevator, stair, and utility shafts• Emergency power feeders.

Page 38: CISSP week 26

Good fences make good neighbors

• If using a perimeter fence, here’s the recommendations:• Standard is 6 foot high fence with 2 inch mesh squares.• 9 gauge vinyl or galvanized metal• Posts should be every feet and anchored into cement• Barbed wire angled out from the top of the fence at a 45 degree angle away from

the protected area.• Fence + barbed wire = 7 foot tall.• Base of fence wire should have a post so fence can’t be pushed or crawled under. • For high security, add a double fence with rolls of barbed wire between the fences.• Fences are psychological deterrents and boundary markers and are easily

penetrated.

Page 39: CISSP week 26
Page 40: CISSP week 26
Page 41: CISSP week 26

Gates

• Gates control access to vehicles and people entering/exiting the facility.• The higher security of the controlled area, the fewer gates should

exist.• One is the optimal number for security, but not very practical with

larger facilities.• Each gate requires authentication resources:• Automated system (cards, keycodes, etc)• Human guards

Page 42: CISSP week 26

Walls

• Walls are more expensive than fences but offer a softer view.• Effective walls should be 7 feet high with 3 or 4 strands of barbed wire

on top.• The disadvantage of walls is view obstruction.

Page 43: CISSP week 26

Perimeter Intrusion Detection

Page 44: CISSP week 26

Infrared Sensors

• Passive Infrared sensors are designed for human body detection.• Measures changes in heat in an area.

• Active Infrared sensors send an IR signal to a receiver. If the signal is interrupted then an alarm triggers.• Laser tripwire basically.

Page 45: CISSP week 26

Microwave Sensors

• Send a controlled microwave pattern into protected area. Baseline is established and any variance is reported as an alarm.• Passes through concrete and steel and should be not be pointed

adjacent to a roadway or adjacent buildings or false posivites will occur.• Bistatic

• Uses separate devices for sensor and receiver. Sends microwave emission between sensor and receiver and looks for variance.

• Monostatic• Has both sensor and receiver in the same unit. Generates a well controlled

beam that can be adjusted to monitor a specific region.

Page 46: CISSP week 26
Page 47: CISSP week 26

Left to right:Passive, bistatic, multistatic(Radar)

Page 48: CISSP week 26

Off Topic Tim:Through Wall Imaging Systems

Page 49: CISSP week 26

Coaxial Strain-Sensitive Cable

• Coaxial cable is woven through a fence. The cable transmits an electric field. If someone tries climbing or cutting the fence, the field fluctuates and is detected in the cable. When this occurs an alarm goes off.• Very tunable, susceptible to weather and climate.• Some are susceptible to EMI and RFI

Page 50: CISSP week 26
Page 51: CISSP week 26

Video Content Analysis and Motion Path Analysis• CCTV cameras can be piped to computers for software analysis. The

software can identify pixel changes and filter out known events to identify suspicious events and raise alarms.

Page 52: CISSP week 26

Lighting

• Lighting deters intruders.• It also makes it easier to see.• Ideally lighting will allow security and employees to notice individuals

at night at a distance of 75 feet or more. They should be able to identify a human face at 33 feet.• Ideally place lighting higher to allow it to disperse naturally and

produce a better aesthetic.

Page 53: CISSP week 26

Types of Lighting

• Fluorescent Lights• Highly efficient and cost effective.• Temperature sensitive. Not effective for outdoor lighting.

• Mercury Vapor Lights• Preferred security light. Disperses strong white-bluish light.• Extended lamp life.• Take time to come to full light.• Common at stadiums.

• Sodium Vapor Light• Soft yellow light.• More efficient than mercury Vapor.• Used in foggy conditions.

• Quartz Lamps• Very bright white light• Immediately on• High wattage – 1500-2000 watts.• Used on perimeters and troublesome areas for high visability and day light levels of light.

Page 54: CISSP week 26

Infrared Lighting

• Most black and white CCTV cameras can see Infrared (IR)• Infrared illuminators can be setup in areas

to enhance camera visibility.

Page 55: CISSP week 26
Page 56: CISSP week 26

Access ControlBadge Systems

• Card Types:• Magnetic Stripe

• Old technology• Can be physically damaged by use• Data can be affected by magnetic fields• Easily duplicated

• Proximity Card (Prox Cards)• Use embedded antenna wires connected to a chip within the card.• Chip is encoded with unique card identification.• Read distance varies by manufacturer and installation.

• Smart Cards• Credential cards with a microchip embedded in them.• Can store access transactions, licenses held by individuals, qualifications, safety training, security access

levels, and biometric templates.• Card can double as an access card for doors and be used as an authenticator for a computer.

Page 57: CISSP week 26

Additional Security measures

• Along with a magstripe, prox, or smart card you can add additional measures to an authentication transaction:• PIN in keypad• Biometric reader

Page 58: CISSP week 26

Fun with access Control Systems (ACS)• When new users are enrolled, they are stored to a central

authentication repository.• This repository is mirrored to all readers on a consistent bases.• If the reader looses access to the central repository, it’s still able to

authenticate known users, just not new additions.

Page 59: CISSP week 26
Page 60: CISSP week 26

More fun with ACS systems…

• Many prox and smart cards have “slots”. These slots hold things such as PKI certificates or biometric data.• Biometric data such as your thumb print.• So in the event the proxy reader can’t communicate with the central

computer, it can still authenticate you based on the card prox number and the thumb print scan on the badge.

Page 61: CISSP week 26
Page 62: CISSP week 26

CCTV CamerasPurposes

• Surveillance• Viewer is able to view multiple locations from a centralized area.

• Assessment• Viewer is able to assess the situation from a safe distance before choosing an

appropriate action.

• Deterrence• May deter unsophisticated burglars, vandals, and intruders

• Evidentiary Archives• Archived images/video may be helpful for identification and prosecution of

trespassers, vandals, and intruders.

Page 63: CISSP week 26

Camera specs

• Color cameras provide more details like color of clothes or color of car.• Black and white cameras are better in low light conditions.• Cameras must have auto-white balance to adjust to changing color

temperatures of daylight and artificial light.• Color cameras require more illumination levels.• High quality color cameras work down to 1.5 foot-candle (fc)

illumination. Black and white work to .5 fc

Page 64: CISSP week 26

Outdoor cameras

• Outdoor cameras are more expensive than indoor.• Lighting changes depending on time of day and weather.• Shrubs, trees, and vegetation can obstruct views.• In cold weather, a heater blower should be added to the camera housing.• Auto-iris lenses should be used since they automatically adjust to light. Strong sunlight can

damage a camera without this feature.• Set the focus in low light with an auto-iris. The focus will stay with more light, but not if

reversed.• “Neutral density (ND)” filters can be added to reduce lighting without changing the color

of the image.• Try to avoid direct sunlight in an image.• Try to avoid sky view in the camera, this will impair the contrast.

Page 65: CISSP week 26

Mounts

• Fixed position Camera• Cannot rotate or pan.• Good for motion detection.• Lower cost• Allows for “pre-alarm” where you can view images from before an alarm.• Unable to follow an dynamic event.

• Pan/Tilt/Zoom (PTZ) Cameras• Cameras allow rotation, panning, tilting, and zooming.• Due to extra electronics these usually cost 4 times more than a standard camera.• Not suited for pre-alarm assessment since the alarm area can change at all times.

• Dome Cameras• Cheaper than PTZ• Hardened plastic lower dome, usually smoke colored to conceal camera.• Better protected in harsh conditions

Page 66: CISSP week 26

IP Cameras

• IP cameras capture digital video.• The camera is connected to a LAN network and video is sent over the

network.• Least secure system.• Cost more than CCTV cameras.• Not normally suitable for high-risk projects

Page 67: CISSP week 26

Security Guards

• Deter unauthorized entry into a facility• Response force to alarm activations• Guards are required to conduct foot patrols of building interiors,

exteriors, and parking areas.• Some guards will be stationary at entrances or security offices.• Required to respond to fire, security, and medical emergencies. And

to renter assistance when needed.• Must be able to submit written and verbal reports regarding

significant events.

Page 68: CISSP week 26

Security Guard Affiliations

• Proprietary (Company Employees)• Increased quality of personnel• Control of security program• Employee loyalty• Prestige for both employee and company• Disadvantage: cost, administration, staffing, impartiality, expertise• Largest disadvantage is time to create an effective security program.

• Contract• Easily adapts to staffing levels• Total cost is rolled into single hourly billable rate: salary, insurance, admin cost, uniforms, benefits.• Contract security is generally impartial.• Guards are easy to replace.• Contract guards usually cost less than proprietary since they’re just a head.

• Hybrid• It’s possible to use some proprietary and some contract security to provide better control over your security

program while making the program cost effective.

Page 69: CISSP week 26

Alarm Monitoring

• For secure facilities, generally two guards are on at all times, 24/7.• Guard 1 is stationed in a security console center and monitors cameras, intrusion systems, and fire

systems.• Guard 2 does walkthroughs and assigned tasks.

• Many organizations use UL 1981 Standard for high security facilities to designate staffing levels.• Requires staffing to be such that all alarm signals can be acknowledged and appropriate dispatch and

verification action can be initiated not more than a defined period after the monitoring facility receiver acknowledges.

• The Security Control Center should be located on the main floor or the basement as long as the area is not below ground level (flood protection)• Entry must be controlled and only authorized personnel allowed in.

• A sign in sheet should be hung up to document any non-authorized personnel being escorted in (police, temporary staff, executives, etc)

• Must have primary and secondary power sources. Secondary power should last for at least 24 hours.

Page 70: CISSP week 26

Visitor Access

• Visitors should be required to sign in and sign out, and document their purpose of visit.• A visitor badge should be given to identify them as a non-employee.• This badge should not be an access card• The badge should state if they require an escort or not. If an escort is

required, the badge should have the name of the escort to make that person personally responsible.

• Some visitor systems can read government issued ID’s by swiping them and identify if the ID is properly formatted or is falsified. The data is populated into a database as a record.

Page 71: CISSP week 26

Doors (Again)

• Door assemblies include the door, its frame, and the anchorage to the building.• Exterior doors should be designed to fit snugly in the doorframe,

preventing gaps.• Perimeter doors should be hollow steel doors or steel clad doors with

steel frames.• Latch and frame anchor should match the strength of the door and frame.• Hinges should be on the interior of restricted areas.• Doors housing sensitive areas should have an automatic door closing

device.

Page 72: CISSP week 26

Why Hinges should be inside….

http://www.firerescue1.com/fire-products/tools/articles/1284289-step-by-step-forcing-an-outward-opening-metal-door/

Page 73: CISSP week 26
Page 74: CISSP week 26

Electronic Locks

• Actuates the door bolt• Some retract the lock without user intervention• Some offer request-to-exit switches• Expensive• Often requires new door for retrofit• Requires special door hinge to accommodate wiring harness

• Can be configured in fail-safe or fail-secure modes.

Page 75: CISSP week 26

Electric Strikes

• Strike is removed (vs bolt being removed)• Can be configured in fail-safe or fail-secure modes.• Unrestricted exit access is allowed.• Can easily be retrofitted to old doors.

Page 76: CISSP week 26

Magnetic Locks

• Easy retrofit• Mounted on door and doorframe• Continuous electric current is provided to hold the door closed.• Locks are fail-safe (fail open) on power loss.• US Life safety Codes require magnetic lock doors have a manual

override device and an automated senor or Request To Exit device.• Locks are controlled by a card reader.

Page 77: CISSP week 26

Mag Locks

Page 78: CISSP week 26

Anti-Passback

• Requires user to badge in and out when entering and leaving.• Easy for accountability• Some systems only allow single entry. To enter again the user must

have left. This stops people from dropping badges out windows or cloning them to get multiple people inside.

Page 79: CISSP week 26

Turnstiles

• Prevents piggybacking or tailgating• Assists guards in verifying that all

users badge in individually

Page 80: CISSP week 26

Mantraps

Page 81: CISSP week 26

Real Mantraps

• Room where you must enter, allow the door to close behind you, and then enter another door which will allow unlock only once you are locked in the room.• This allows employees to know if someone is piggybacking.• A footstep detecting floor can be added to identify the amount of

people in the room.

Page 82: CISSP week 26
Page 83: CISSP week 26

Safes

• Last line of defense.• You should have spent more on guards, doors, and sensors.• Different categories.• Tool Resist

• Rating of TL-15 means it’s tool resistant for 15 minutes.• To be TL-15 it must weight at least 750 pounds or have anchors.• Have a metal body that is solid or fabricated of at least 1 inch thick with tensile strength

of 50,000 PSI and is fastened to the floor with ¼ inch steel.• No hole on the safe can be larger than ¼ inch when closed.• Must have a relocking device if the lock is destroyed.

Page 84: CISSP week 26

Vault

• Different Categories:• Class M – ¼ hour• Class 1 – ½ hour• Class 2 – 1 hour• Class 3 – 2 hour

Page 85: CISSP week 26

Biometrics

• Measure biological characteristics• Fingerprints, hand geometry, voice print, iris pattern, etc

• Common failures• False acceptance (Type I error) – erroneously allows access by confusing one

user with another or falsely recognizing an imposter• False rejection (Type II error) – fails to recognize a legitimate user

• Most biometrics can be tuned to adjust the false acceptance rate (FAR) and false rejection rate (FRR)• The spot where FAR and FRR meet is called the Crossover Error Rate (CER)• CER can be used to compare accuracy between different devices

Page 86: CISSP week 26

Biometrics

Page 87: CISSP week 26

Biometrics

• Fingerprint• Compares pattern on fingers to a stored template• Some require multiple fingers for either:

• More accuracy – harder to forge multiple fingerprints• More flexibility – injury to one finger doesn’t bar access

• Modern scanners detect temperature and pulse

• Facial image• Compates facial features to stored image

• Eye width, mouth width, nose height – general proportions

Page 88: CISSP week 26

Biometrics

• Hand geometry• Uses distance between knuckle joints, finger lengths• Generally faster than other biometrics• Reasonably accurate• Higher false acceptance rates

• Voice recognition• Less expensive• Require isolation from background noise• Often paired with another access check like a PIN

Page 89: CISSP week 26

Biometrics

• Iris patterns• Iris is less susceptible to theft or injury than fingers• Slower – typically about 2 seconds per check• Some people don’t like having their eyes scanned

• Retina scanning• Scans blood vessels at the back of the eye• Very high security but lots of hurdles to implementing• Slow - Typically 10 seconds per check• Intrusive – have to take off glasses, hold very still• Some people think it will damage their eyes

Page 90: CISSP week 26

Biometrics

• Signature dynamics• Compares stored signature style• Speed of writing, direction, as well as finished signature• Easy for signers – don’t need to learn anything new

• Vascular patterns• Maps veins in hands or fingers• Difficult to forge• Contact-less – hygiene benefits

Page 91: CISSP week 26

Biometrics

• Keystroke dynamics• Analyses the way a person types• Keystroke rhythm template

• Dwell time – how long the key is pressed• Flight time – time between key presses

Page 92: CISSP week 26

Communications and Server Rooms

• Lightning protection• Ground Potential Rise (GPR)

• Lightning strike to a grounding system• Causes surge that can damage equipment, personnel

• Equipment damage may not manifest itself immediately• Mean time before failure (MTBF) – average life expectancy of equipment• Latent damage – shortens MTBF

• Avoidance• Can use fiber instead to avoid the issue• Or isolate the circuits using optical isolators or isolation transformers

• Mounted in a non-conducting cabinet• Called a High voltage interface (HVI)

Page 93: CISSP week 26

Communications and Server Rooms

• Server room• No windows• Only one controlled entry• Physical access to a system = game over

• So don’t let it happen!• Metal conduits for cabling leading from/to (ideally everywhere)

Page 94: CISSP week 26

Communications and Server Rooms

• Rack security

… no.

Page 95: CISSP week 26

Communications and Server Rooms

• Rack security• Don’t stop at access control for the server room – lock server racks

• Doubtful that everyone with server room access needs access to every rack• Do electricians need to get into the racks? Probably not

• Manageable rack locks• Can be remotely configures for more advanced access control than classic keys• Only allow unlocking during certain times or day• Require manager approval

• Monitor temperature, power consumption

Page 96: CISSP week 26

Work Area Security

• Server rooms, closets probably not the best place to put workspaces• High security personnel behind more secured areas• Outside of secured rooms• Security containers – locking cabinets• Clean desk approach – clean/lock everything up at the end of the day

• Maintain strong password protection on workstations• Point screens away from windows• Use privacy filters or screen protectors• Shredding policy to destroy paper copies of sensitive information

Page 97: CISSP week 26

Restricted Work Areas

• Sensitive Compartmented Information Facility (SCIF)• Prevent & detect visual, acoustic, technical, physical access• 3 layers of 5/8 inch drywall, true floor to true ceiling• One door with X-09 combination lock• Door frame affixed to surrounding wall & strong enough to prevent distortion• Automatic door closer• Door alarms• Noisemaking device over doors, pointed at windows• HVAC requirements restricting size or requiring bars on ducts• Intrusion detection that response force can respond to within 15 minutes

Page 98: CISSP week 26

Utilities and Power

• UPS – battery backup for short term power outages• Generator• Activate automatically in power outage• Typically diesel fueled

• HVAC• Heating, ventilation, air conditioning• Keeps system temperature in range to avoid damage or outages

Page 99: CISSP week 26

Fire Detection

• Detectors – sound alarm to give people a chance to escape• Types

• Smoke• Categories

• Photoelectric• Physical process (ionization)

• Flame• UV

• Heat• Sudden temperature changes• High temps

Page 100: CISSP week 26

Fire Suppression

• Water• Wet system – filled with water that sprays until water supply is shut off• Dry system – valve fills system with water when triggered• Pre-action system – water held back until detectors are activated• Deluge system – like pre-action but sprinkler heads are left open

• Gas• Halon – outdated, leaves residue, can injure personnel• Aero-K• FM-200

Page 101: CISSP week 26

The End!