+ All Categories
Home > Documents > ITNS and CERIAS CISSP Luncheon Series: Physical (Environmental) Security

ITNS and CERIAS CISSP Luncheon Series: Physical (Environmental) Security

Date post: 23-Jan-2016
Category:
Upload: ariane
View: 36 times
Download: 0 times
Share this document with a friend
Description:
ITNS and CERIAS CISSP Luncheon Series: Physical (Environmental) Security. Presented by Scott L. Ksander. Physical Security. From (ISC)2 Candidate Information Bulletin: - PowerPoint PPT Presentation
Popular Tags:
54
1 ITNS and CERIAS CISSP Luncheon Series: Physical (Environmental) Security Presented by Scott L. Ksander
Transcript
Page 1: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

1

ITNS and CERIAS CISSP Luncheon Series: Physical (Environmental) Security

Presented by Scott L. Ksander

Page 2: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

2

Physical Security

From (ISC)2 Candidate Information Bulletin:• The Physical (Environmental) Security

domain addresses the threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise’s resources and sensitive information. These resources include people, the facility in which they work, and the data, equipment, support systems, media, and supplies they utilize.

Page 3: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

3

Physical Security

From (ISC)2 Candidate Information Bulletin:• The candidate will be expected to know the

elements involved in choosing a secure site, its design and configuration, and the methods for securing the facility against unauthorized access, theft of equipment and information, and the environmental and safety measures needed to protect people, the facility, and its resources.

Page 4: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

4

Introduction

Threats to physical security include:• Interruption of services• Theft• Physical damage• Unauthorized disclosure• Loss of system integrity

Page 5: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

5

Introduction

Threats fall into many categories:• Natural environmental threats (e.g., floods,

fire)• Supply system threats (e.g., power outages,

communication interruptions)• Manmade threats (e.g., explosions,

disgruntled employees, fraud)• Politically motivated threats (e.g., strikes,

riots, civil disobedience)

Page 6: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

6

Introduction

Primary consideration in physical security is that nothing should impede “life safety goals.”• Ex.: Don’t lock the only fire exit door from

the outside.

“Safety:” Deals with the protection of life and assets against fire, natural disasters, and devastating accidents.

“Security:” Addresses vandalism, theft, and attacks by individuals.

Page 7: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

7

Physical Security Planning

Physical security, like general information security, should be based on a layered defense model.

Layers are implemented at the perimeter and moving toward an asset.

Layers include: Deterrence, Delaying, Detection, Assessment, Response

Page 8: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

8

Physical Security Planning

A physical security program must address:• Crime and disruption protection through deterrence (fences, security guards, warning signs, etc.).

• Reduction of damages through the use of delaying mechanisms (e.g., locks, security personnel, etc.).

• Crime or disruption detection (e.g., smoke detectors, motion detectors, CCTV, etc.).

• Incident assessment through response to incidents and determination of damage levels.

• Response procedures (fire suppression mechanisms, emergency response processes, etc.).

Page 9: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

9

Physical Security Planning

Crime Prevention Through Environmental Design (CPTED)• Is a discipline that outlines how the

proper design of a physical environment can reduce crime by directly affecting human behavior.• Concepts developed in 1960’s.• Think: Social Engineering

Page 10: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

10

Physical Security Planning

CPTED has three main strategies:• Natural Access Control• Natural Surveillance• Territorial Reinforcement

Page 11: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

11

Physical Security Planning

Natural Access Control• The guidance of people entering and

leaving a space by the placement of doors, fences, lighting, and landscaping• Be familiar with: bollards, use of

security zones, access barriers, use of natural access controls

Page 12: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

12

Physical Security Planning

Natural Surveillance• Is the use and placement of physical

environmental features, personnel walkways, and activity areas in ways that maximize visibility.

• The goal is to make criminals feel uncomfortable and make all other people feel safe and comfortable, through the use of observation.

Page 13: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

13

Physical Security Planning

Territorial Reinforcement• Creates physical designs that

highlight the company’s area of influence to give legitimate owners a sense of ownership.• Accomplished through the use of

walls, lighting, landscaping, etc.

Page 14: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

14

Physical Security Planning

CPTED is not the same as “target hardening”

Target hardening focuses on denying access through physical and artificial barriers (can lead to restrictions on use, enjoyment, and aesthetics of the environment).

Page 15: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

15

Physical Security Planning

Issues with selecting a facility site:• Visibility (terrain, neighbors, population of

area, building markings)• Surrounding area and external factors

(crime rate, riots, terrorism, first responder locations)

• Accessibility (road access, traffic, proximity to transportation services)

• Natural Disasters (floods, tornados, earthquakes)

Page 16: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

16

Physical Security Planning

Other facility considerations:• Physical construction materials and

structure composition» Be familiar with: load, light frame

construction material, heavy timber construction material, incombustible material, dire resistant material (know the fire ratings and construction properties).

Page 17: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

17

Physical Security Planning

“Mantrap:” A small room with two doors. The first door is locked; a person is identified and authenticated. Once the person is authenticated and access is authorized, the first door opens and allows the person into the mantrap. The person has to be authenticated again in order to open the second door and access a critical area. The mantrap area could have a weight sensing floor as an additional control to prevent literal piggybacking.

Page 18: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

18

Physical Security Planning

Automatic door lock configuration:

“Fail safe:” If a power disruption occurs, the door defaults to being unlocked.

“Fail secure:” If a power disruption occurs, the door defaults to being locked.

Page 19: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

19

Physical Security Planning

Windows can also be used to promote physical security.

Know the different types of glass:• Standard• Tempered• Acrylic• Wired• Laminated• Solar Window Film• Security Film

Page 20: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

20

Physical Security Planning

Consider use of internal partitions carefully:• True floor to true ceiling to counter

security issues• Should never be used in areas that

house sensitive systems and devices

Page 21: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

21

Internal Support Systems

Power issues:• A continuous supply of electricity assures

the availability of company resources.• Data centers should be on a different power

supply from the rest of the building• Redundant power supplies: two or more

feeds coming from two or more electrical substations

Page 22: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

22

Internal Support Systems

Power protection:• UPS Systems

» Online UPS systems» Standby UPS System

• Power line conditioners• Backup Sources

Page 23: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

23

Internal Support Systems

Other power terms to know:• Ground• Noise• Transient Noise• Inrush Current• Clean Power• EMI• RFI

Page 24: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

24

Internal Support Systems

Types of Voltage Fluctuations• Power Excess

» Spike» Surge

• Power Loss» Fault » Blackout

• Power Degradation» Sag/dip» Brownout» Inrush Current

Page 25: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

25

Internal Support Systems

Environmental Issues• Positive Drains• Static Electricity• Temperature

Page 26: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

26

Internal Support Systems

Environmental Issues: Positive Drains• Contents flow out instead of in• Important for water, steam, gas lines

Page 27: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

27

Internal Support Systems

Environmental Issues: Static Electricity• To prevent:

» Use antistatic flooring in data processing areas

» Ensure proper humidity» Proper grounding» No carpeting in data centers» Antistatic bands

Page 28: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

28

Internal Support Systems

Environmental Issues: Temperature• Computing components can be affected

by temperature:» Magnetic Storage devices: 100 Deg. F.» Computer systems and peripherals: 175

Deg. F.» Paper products: 350 Deg. F.

Page 29: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

29

Internal Support Systems

Ventilation• Airborne materials and particle

concentration must be monitored for inappropriate levels.• “Closed Loop”• “Positive Pressurization”

Page 30: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

30

Internal Support Systems

Fire prevention, detection, suppression

“Fire Prevention:” Includes training employees on how to react, supplying the right equipment, enabling fire suppression supply, proper storage of combustible elements

“Fire Detection:” Includes alarms, manual detection pull boxes, automatic detection response systems with sensors, etc.

“Fire Suppression:” Is the use of a suppression agent to put out a fire.

Page 31: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

31

Internal Support Systems

American Society for Testing and Materials (ASTM) is the organization that creates the standards that dictate how fire resistant ratings tests should be carried out and how to properly interpret results.

Page 32: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

32

Internal Support Systems

Fire needs oxygen and fuel to continue to grow.

Ignition sources can include the failure of an electrical device, improper storage of materials, malfunctioning heating devices, arson, etc.

Special note on “plenum areas:” The space above drop down ceilings, wall cavities, and under raised floors. Plenum areas should have fire detectors and should only use plenum area rated cabling.

Page 33: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

33

Internal Support Systems

Types of Fire:• A: Common Combustibles

» Elements: Wood products, paper, laminates» Suppression: Water, foam

• B: Liquid» Elements: Petroleum products and coolants» Suppression: Gas, CO2, foam, dry powders

• C: Electrical» Elements: Electrical equipment and wires» Suppression: Gas, CO2, dry powders

• D: Combustible Metals» Elements: magnesium, sodium, potassium» Suppression: Dry powder

• K: Commercial Kitchens» Elements: Cooking oil fires» Suppression: Wet chemicals such as potassium acetate.

Page 34: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

34

Internal Support Systems

Types of Fire Detectors• Smoke Activated• Heat Activated

• Know the types and properties of each general category.

Page 35: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

35

Internal Support Systems

Different types of suppression agents:• Water• Halon and halon substitutes• Foams• Dry Powders• CO2• Soda Acid

• Know suppression agent properties and the types of fires that each suppression agent combats

• Know the types of fire extinguishers (A,B,C, D) that combat different types of fires

Page 36: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

36

Internal Support Systems

Types of Sprinklers• Wet Pipe Systems (aka Closed Head

System)• Dry Pipe Systems• Preaction Systems• Deluge Systems

Page 37: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

37

Perimeter Security

The first line of defense is perimeter control at the site location, to prevent unauthorized access to the facility.

Perimeter security has two modes:• Normal facility operation• Facility closed operation

Page 38: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

38

Perimeter Security

Proximity protection components put in place to provide the following services:• Control of pedestrian and vehicle traffic• Various levels of protection for

different security zones• Buffers and delaying mechanisms to

protect against forced entry• Limit and control entry points

Page 39: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

39

Perimeter Security

Protection services can be provided by:• Access Control Mechanisms• Physical Barriers• Intrusion Detection• Assessment• Response• Deterrents

Page 40: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

40

Perimeter Security

Fences are “first line of de’fence’” mechanisms. (Small Joke!)

Varying heights, gauge, and mesh provides security features (know them).

Barbed wire direction makes a difference.

Page 41: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

41

Perimeter Security

Perimeter Intrusion Detection and Assessment System (PIDAS): • A type of fencing that has sensors on

the wire mesh and base of the fence. • A passive cable vibration sensor sets

off an alarm if an intrusion is detected.

Page 42: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

42

Perimeter Security

Gates have 4 distinct types:• Class I: Residential usage• Class II: Commercial usage, where general

public access is expected (e.g., public parking lot, gated community, self storage facility)

• Class III: Industrial usage, where limited access is expected (e.g., warehouse property entrance not intended to serve public)

• Class IV: Restricted access (e.g., a prison entrance that is monitored either in person or via CCTV)

Page 43: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

43

Perimeter Security

Locks are inexpensive access control mechanisms that are widely accepted and used.

Locks are considered delaying devices.

Know your locks!

Page 44: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

44

Perimeter Security

Types of Locks• Mechanical Locks

» Warded & Tumbler• Combination Locks• Cipher Locks (aka programmable locks)

» Smart locks• Device Locks

» Cable locks, switch controls, slot locks, port controls, peripheral switch controls, cable traps

Page 45: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

45

Perimeter Security

Lock Strengths:• Grade 1 (commercial and industrial use)• Grade 2 (heavy duty residential/light duty

commercial)• Grade 3 (residential and consumer expendable)

Cylinder Categories• Low Security (no pick or drill resistance)• Medium Security (some pick resistance)• High Security (pick resistance through many

different mechanisms—used only in Grade 1 & 2 locks)

Page 46: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

46

Perimeter Security

Lighting• Know lighting terms and types of lighting to

use in different situations (inside v. outside, security posts, access doors, zones of illumination)

• It is important to have the correct lighting when using various types of surveillance equipment.

• Lighting controls and switches should be in protected, locked, and centralized areas.

Page 47: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

47

Perimeter Security

“Continuous lighting:” An array of lights that provide an even amount of illumination across an area.

“Controlled lighting:” An organization should erect lights and use illumination in such a way that does not blind its neighbors or any passing cars, trains, or planes.

“Standby Lighting:” Lighting that can be configured to turn on and off at different times so that potential intruders think that different areas of the facility are populated.

“Redundant” or “backup lighting:” Should be available in case of power failures or emergencies.

“Response Area Illumination:” Takes place when an IDS detects suspicious activities and turns on the lights within the specified area.

Page 48: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

48

Perimeter Security

Surveillance Devices• These devices usually work in

conjunction with guards or other monitoring mechanisms to extend their capacity.• Know the factors in choosing CCTV,

focal length, lens types (fixed v. zoom), iris, depth of field, illumination requirements

Page 49: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

49

Perimeter Security

“Focal length:” The focal length of a lens defines its effectiveness in viewing objects from a horizontal and vertical view.

The sizes of images that will be shown on a monitor along with the area that can be covered by one camera are defined by focal length. • Short focal length = wider angle views• Long focal length = narrower views

Page 50: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

50

Perimeter Security

“Depth of field:” Refers to the portion of the environment that is in focus

“Shallow depth of focus:” Provides a softer backdrop and leads viewers to the foreground object

“Greater depth of focus:” Not much distinction between objects in the foreground and background.

Page 51: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

51

Perimeter Security

Intrusion Detection systems are used to detect unauthorized entries and to alert a responsible entity to respond.

Know the different types of IDS systems (electro-mechanical v. volumetric) and changes that can be detected by an IDS system.

Page 52: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

52

Perimeter Security

Patrol Force and Guards• Use in areas where critical reasoning

skills are required

Auditing Physical Access• Need to log and review:

» Date & time of access attempt» Entry point» User ID» Unsuccessful access attempts

Page 53: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

53

Physical Security

Final Concept to Guide in Assessing Physical Security Issues on Exam:• Deterrence• Delay• Detection• Assessment• Response

Page 54: ITNS and CERIAS  CISSP Luncheon Series:   Physical (Environmental) Security

54

Physical Security

Resources• All in One Book (Shon Harris, 2005)• Official (ISC)² Guide to the CISSP CBK

((ISC)², 2006)


Recommended