PHYSICAL SECURITY
Prepared by:
Canlas, John Michael
Garcia,AshleyVeynard
BSIT-3B
Physical security is the protection of people,
property, and physical assets from actions and
events that could cause damage or loss.
WHY PHYSICAL SECURITY IS
IMPORTANT
Physical security is about keeping your facilities,
people and assets safe from real-world threats. It
includes physical deterrence, detection of intruders,
and responding to those threats.
MOST COMMON THREATS TO
PHYSICAL SECURITY
• Theft and burglary
• Vandalism
• Natural disasters
• Terrorism or sabotage
• Violence in the workplace
HUMAN ERROR IS ACTUALLY ONE OF THE
LEADING CAUSE OF SECURITY BREACHES
• Employees sharing their credentials with others
• Accidental release or sharing of confidential data
and information
• Tailgating incidents with unauthorized individuals
• Easily hacked authentication processes
• Slow and limited response to security incidents
PHYSICAL SECURITY LARGELY COMES
DOWN TO A COUPLE OF CORE
COMPONENTS:
ACCESS CONTROL AND
SURVEILLANCE.
COMPONENTS OF PHYSICAL SECURITY
CONTROLS
1. DETERRENCE – THESE ARE THE PHYSICAL SECURITY MEASURES THAT KEEP
PEOPLE OUT OR AWAY FROM THE SPACE.
2. DETECTION - THE COMPONENTS OF YOUR PHYSICAL SECURITY SYSTEM
HELP IDENTIFY A POTENTIAL SECURITY EVENT OR INTRUDER.
3. DELAY – THERE ARE CERTAIN SECURITY SYSTEMS THAT ARE DESIGNED TO
SLOW INTRUDERS DOWN AS THEY ATTEMPT TO ENTER A FACILITY OR
BUILDING.
4. RESPONSE – THE COMPONENTS THAT ARE IN PLACE ONCE A BREACH OR
INTRUSION OCCURS.
ACCESS CONTROL
• Access Control Encompasses a large area
that includes basic barriers to more
sophisticated things such as keypad, ID card
or biometrically-restricted doors.
• The first line of defense is the building itself
SURVEILLANCE
• Surveillance includes everything from guards on
patrol, burglar alarms and CCTV to sound and
movement sensors and keeping a log of who went
where.
• At more high-risk locations, companies can deploy
far more sophisticated detectors such as proximity,
infrared, image, optical, temperature, smoke and
pressure sensors to maintain a holistic view of their
facilities
EXAMPLES OF PHYSICAL
SECURITY CONTROLS
WARNING SIGNS
FENCES
RESTRICTED ACCESS POINTS
CCTV CAMERAS
MOTION SENSORS
INTRUDER ALARMS
AI ANALYTICS
COMPUTER ROOMS
AND WIRING CLOSETS
MOST COMMON THREAT
TO PHYSICAL SECURITY
THEFT OR BURGLARY
VANDALISM
NATURAL DISASTERS
TERRORISM OR SABOTAGE
VIOLENCE INTHE WORKPLACE
IOT AND AI BRING PHYSICAL
SECURITY INTO THE DIGITAL WORLD
IOT AND AI BRING PHYSICAL
SECURITY INTO THE DIGITAL WORLD
• WHERE TYPICALLY PHYSICAL SECURITY AND DIGITAL SECURITY
USED TO BE ENTIRELY SEPARATE REALMS, THEY ARE SLOWLY
BECOMING MORE AND MORE INTERTWINED. SURVEILLANCE
SYSTEMS ARE INCREASINGLY CONNECTED TO THE INTERNET,
ACCESS CONTROL SYSTEMS AND MONITORING SYSTEMS ARE
KEEPING DIGITAL LOGS, WHILE USE CASES FOR AI IN PHYSICAL
SECURITY ARE BECOME MORE POPULAR.
• FOR EXAMPLE, CCTV-BASED IMAGE RECOGNITION CAN ALERT
YOU TO THE ARRIVAL OF PEOPLE OR VEHICLES.
PHYSICAL SECURITY POLICIES
• CREATES GUIDELINES AND RULES FOR
PERSONNEL AND EQUIPMENT THAT ENSURE
THAT YOUR BUSINESS'S INFORMATION,
RESOURCES, AND FACILITIES ARE PROTECTED
FROM DANGER, DAMAGE, OR REMOVAL.
TAKE A RISK BASED-APPROACH AND
DO YOUR RESEARCH
• MAP YOUR RISK PROFILE AND PUT IN APPROPRIATE CONTROLS.
DON’T EMPLOY A TEAM OF ARMED GUARDS WHERE A SIMPLE
CARD LOCK WITH CCTV WILL DO. “A SUPPLIER NEEDS TO
PROTECT THEMSELVES IN ORDER TO PROTECT THEIR
CUSTOMERS SO SUPPLY CHAIN DUE DILIGENCE IN A MUST”
SAYS KENNY. “WHO ARE WE WORKING WITH, WHAT SORT OF
INTERNAL PROCESSES AND POLICIES DO THEY FOLLOW, WHAT
FRAMEWORKS DO THEY FOLLOW AROUND HARDENING
SYSTEMS?" MAKE SURE THAT THE PEOPLE YOU'RE BUYING
TECHNOLOGIES FROM UNDERSTAND THE RISKS AND HAVE
THINGS IN PLACE LIKE VULNERABILITY MANAGEMENT
PROGRAMS, SECURITY ADVISORY NOTIFICATIONS IF
SOMETHING DOES GO WRONG.
MAKE SURE ACCESS CONTROLS ARE TIED
TO PEOPLE AND CUSTOMIZE ACCESS
• EACH ID CARD OR KEYCODE SHOULD HAVE A UNIQUE PERSON
TIED TO IT. BLANKET ACCESS CARDS OR CODES MAKE DATA
LEAKS MORE LIKELY AND HARDER TO TRACK. IF YOUR FACILITY
HAS STRICT SCHEDULES, ENSURE ACCESS IS TIED TO TIMES--FOR
EXAMPLE, NO OVERNIGHT ACCESS FOR CATERERS.
HAVE AUDIT TRAILS AND KEEP
INVENTORY
• KEEP LOGS OF NOT ONLY WHO ACCESSED WHAT, BUT ALSO OF
ATTEMPTS. REPEATED FAILED ATTEMPTS TO ACCESS MIGHT
SIGNAL BAD ACTORS. KNOW WHO IS IN PROCESSION OF ALL
CARDS, KEYS AND OTHER ACCESS ITEMS. REVOKE ACCESS IF A
CARD IS LOST OR WHEN EMPLOYEE CIRCUMSTANCES CHANGE.
CLAIM BACK KEYS AS SOON AS POSSIBLE IF SOMEONE LEAVES.
EDUCATE STAFF TO FOLLOW PROTOCOL
FOR DEALING WITH GUESTS
• PEOPLE ARE USUALLY FRIENDLY AND WANT TO HELP. TEACHING
EMPLOYEES – INCLUDING GUARDS -- TO KEEP A HEALTHY
SKEPTICISM, FOLLOW PROPER PROCEDURE, AND NOT GIVE OUT
TOO MUCH INFORMATION CAN REDUCE THE CHANCE OF YOUR
OWN WORKERS BEING USED AGAINST YOU.
TEST YOUR CAPABILITIES AND
PROCESSES
• RUN SIMULATIONS; TRY TO GAIN ACCESS TO YOUR OWN
FACILITIES. IN THE SAME WAY COMPANIES WILL OFTEN SEND
OUT FAKE PHISHING EMAILS AS TEST OF WORKERS' ATTENTION
TO DETAIL, SEE IF YOUR WORKERS GIVE OUT INFORMATION
OVER THE PHONE OR LET UNVERIFIED GUESTS IN.
TOP CONSIDERATIONS FOR PHYSICAL
SECURITY PLANNING
1. IDENTIFY THE SCOPE OF YOUR PHYSICAL SECURITY PLANS. THIS SHOULD
INCLUDE THE TYPES OF EMPLOYEES THE POLICIES APPLY TO, AND HOW
RECORDS WILL BE COLLECTED AND DOCUMENTED.
2. DETERMINE WHO IS RESPONSIBLE FOR IMPLEMENTING YOUR PHYSICAL
SECURITY PLANS, AS WELL AS THE KEY DECISION -MAKERS FOR MAKING
ADJUSTMENTS OR CHANGES TO THE PLAN.
3. INCLUDE THE DIFFERENT PHYSICAL SECURITY TECHNOLOGY
COMPONENTS YOUR POLICY WILL COVER.
4. STATE THE TYPES OF PHYSICAL SECURITY CONTROLS YOUR POLICY WILL
EMPLOY. INCLUDE ANY PHYSICAL ACCESS CONTROL SYSTEMS , PERMISSION
LEVELS, AND TYPES OF CREDENTIALS YOU PLAN ON USING.
5. LIST OUT KEY ACCESS POINTS, AND HOW YOU PLAN TO KEEP THEM
SECURE.
TOP CONSIDERATIONS FOR PHYSICAL
SECURITY PLANNING
6 . D E F I N E YO U R M O N I TO R I N G A N D D E T E C T I O N S YS T E M S . W H AT T Y P E S O F V I D E O
S U RV E I L L A N C E , S E N S O R S , A N D A L A R M S W I L L YO U R P H YS I C A L S E C U R I T Y P O L I C I E S
I N C L U D E ? I D E N T I F Y W H O W I L L B E R E S P O N S I B L E F O R M O N I TO R I N G T H E S YS T E M S , A N D
W H I C H P RO C E S S E S W I L L B E AU TO M AT E D.
7 . O U T L I N E A L L I N C I D E N T R E S P O N S E P O L I C I E S . YO U R P H YS I C A L S E C U R I T Y P L A N N I N G
N E E D S TO A D D R E S S H OW YO U R T E A M S W I L L R E S P O N D TO D I F F E R E N T T H R E AT S A N D
E M E R G E N C I E S .
8 . S C O P E O U T H OW TO H A N D L E V I S I TO R S , V E N D O R S , A N D C O N T R AC TO R S T O E N S U R E
YO U R P H YS I C A L S E C U R I T Y P O L I C I E S A R E N OT V I O L AT E D.
9 . C R E AT E A C Y B E R S E C U R I T Y P O L I C Y F O R H A N D L I N G P H YS I C A L S E C U R I T Y T E C H N O L O G Y
DATA A N D R E C O R D S . I N C L U D E YO U R P O L I C I E S F O R E N C RY P T I O N , V U L N E R A B I L I T Y
T E S T I N G , H A R DWA R E S E C U R I T Y, A N D E M P L OY E E T R A I N I N G .
1 0 . A D D R E S S H OW P H YS I C A L S E C U R I T Y P O L I C I E S A R E C O M M U N I C AT E D T O T H E T E A M , A N D
W H O R E Q U I R E S AC C E S S TO T H E P L A N .
THANK YOU FOR LISTENING!

physical-security (1).pdf

  • 1.
    PHYSICAL SECURITY Prepared by: Canlas,John Michael Garcia,AshleyVeynard BSIT-3B
  • 2.
    Physical security isthe protection of people, property, and physical assets from actions and events that could cause damage or loss.
  • 3.
    WHY PHYSICAL SECURITYIS IMPORTANT Physical security is about keeping your facilities, people and assets safe from real-world threats. It includes physical deterrence, detection of intruders, and responding to those threats.
  • 4.
    MOST COMMON THREATSTO PHYSICAL SECURITY • Theft and burglary • Vandalism • Natural disasters • Terrorism or sabotage • Violence in the workplace
  • 5.
    HUMAN ERROR ISACTUALLY ONE OF THE LEADING CAUSE OF SECURITY BREACHES • Employees sharing their credentials with others • Accidental release or sharing of confidential data and information • Tailgating incidents with unauthorized individuals • Easily hacked authentication processes • Slow and limited response to security incidents
  • 6.
    PHYSICAL SECURITY LARGELYCOMES DOWN TO A COUPLE OF CORE COMPONENTS: ACCESS CONTROL AND SURVEILLANCE.
  • 7.
    COMPONENTS OF PHYSICALSECURITY CONTROLS 1. DETERRENCE – THESE ARE THE PHYSICAL SECURITY MEASURES THAT KEEP PEOPLE OUT OR AWAY FROM THE SPACE. 2. DETECTION - THE COMPONENTS OF YOUR PHYSICAL SECURITY SYSTEM HELP IDENTIFY A POTENTIAL SECURITY EVENT OR INTRUDER. 3. DELAY – THERE ARE CERTAIN SECURITY SYSTEMS THAT ARE DESIGNED TO SLOW INTRUDERS DOWN AS THEY ATTEMPT TO ENTER A FACILITY OR BUILDING. 4. RESPONSE – THE COMPONENTS THAT ARE IN PLACE ONCE A BREACH OR INTRUSION OCCURS.
  • 8.
    ACCESS CONTROL • AccessControl Encompasses a large area that includes basic barriers to more sophisticated things such as keypad, ID card or biometrically-restricted doors. • The first line of defense is the building itself
  • 9.
    SURVEILLANCE • Surveillance includeseverything from guards on patrol, burglar alarms and CCTV to sound and movement sensors and keeping a log of who went where. • At more high-risk locations, companies can deploy far more sophisticated detectors such as proximity, infrared, image, optical, temperature, smoke and pressure sensors to maintain a holistic view of their facilities
  • 10.
    EXAMPLES OF PHYSICAL SECURITYCONTROLS WARNING SIGNS FENCES RESTRICTED ACCESS POINTS CCTV CAMERAS MOTION SENSORS INTRUDER ALARMS AI ANALYTICS COMPUTER ROOMS AND WIRING CLOSETS
  • 11.
    MOST COMMON THREAT TOPHYSICAL SECURITY THEFT OR BURGLARY VANDALISM NATURAL DISASTERS TERRORISM OR SABOTAGE VIOLENCE INTHE WORKPLACE
  • 12.
    IOT AND AIBRING PHYSICAL SECURITY INTO THE DIGITAL WORLD
  • 13.
    IOT AND AIBRING PHYSICAL SECURITY INTO THE DIGITAL WORLD • WHERE TYPICALLY PHYSICAL SECURITY AND DIGITAL SECURITY USED TO BE ENTIRELY SEPARATE REALMS, THEY ARE SLOWLY BECOMING MORE AND MORE INTERTWINED. SURVEILLANCE SYSTEMS ARE INCREASINGLY CONNECTED TO THE INTERNET, ACCESS CONTROL SYSTEMS AND MONITORING SYSTEMS ARE KEEPING DIGITAL LOGS, WHILE USE CASES FOR AI IN PHYSICAL SECURITY ARE BECOME MORE POPULAR. • FOR EXAMPLE, CCTV-BASED IMAGE RECOGNITION CAN ALERT YOU TO THE ARRIVAL OF PEOPLE OR VEHICLES.
  • 14.
    PHYSICAL SECURITY POLICIES •CREATES GUIDELINES AND RULES FOR PERSONNEL AND EQUIPMENT THAT ENSURE THAT YOUR BUSINESS'S INFORMATION, RESOURCES, AND FACILITIES ARE PROTECTED FROM DANGER, DAMAGE, OR REMOVAL.
  • 15.
    TAKE A RISKBASED-APPROACH AND DO YOUR RESEARCH • MAP YOUR RISK PROFILE AND PUT IN APPROPRIATE CONTROLS. DON’T EMPLOY A TEAM OF ARMED GUARDS WHERE A SIMPLE CARD LOCK WITH CCTV WILL DO. “A SUPPLIER NEEDS TO PROTECT THEMSELVES IN ORDER TO PROTECT THEIR CUSTOMERS SO SUPPLY CHAIN DUE DILIGENCE IN A MUST” SAYS KENNY. “WHO ARE WE WORKING WITH, WHAT SORT OF INTERNAL PROCESSES AND POLICIES DO THEY FOLLOW, WHAT FRAMEWORKS DO THEY FOLLOW AROUND HARDENING SYSTEMS?" MAKE SURE THAT THE PEOPLE YOU'RE BUYING TECHNOLOGIES FROM UNDERSTAND THE RISKS AND HAVE THINGS IN PLACE LIKE VULNERABILITY MANAGEMENT PROGRAMS, SECURITY ADVISORY NOTIFICATIONS IF SOMETHING DOES GO WRONG.
  • 16.
    MAKE SURE ACCESSCONTROLS ARE TIED TO PEOPLE AND CUSTOMIZE ACCESS • EACH ID CARD OR KEYCODE SHOULD HAVE A UNIQUE PERSON TIED TO IT. BLANKET ACCESS CARDS OR CODES MAKE DATA LEAKS MORE LIKELY AND HARDER TO TRACK. IF YOUR FACILITY HAS STRICT SCHEDULES, ENSURE ACCESS IS TIED TO TIMES--FOR EXAMPLE, NO OVERNIGHT ACCESS FOR CATERERS.
  • 17.
    HAVE AUDIT TRAILSAND KEEP INVENTORY • KEEP LOGS OF NOT ONLY WHO ACCESSED WHAT, BUT ALSO OF ATTEMPTS. REPEATED FAILED ATTEMPTS TO ACCESS MIGHT SIGNAL BAD ACTORS. KNOW WHO IS IN PROCESSION OF ALL CARDS, KEYS AND OTHER ACCESS ITEMS. REVOKE ACCESS IF A CARD IS LOST OR WHEN EMPLOYEE CIRCUMSTANCES CHANGE. CLAIM BACK KEYS AS SOON AS POSSIBLE IF SOMEONE LEAVES.
  • 18.
    EDUCATE STAFF TOFOLLOW PROTOCOL FOR DEALING WITH GUESTS • PEOPLE ARE USUALLY FRIENDLY AND WANT TO HELP. TEACHING EMPLOYEES – INCLUDING GUARDS -- TO KEEP A HEALTHY SKEPTICISM, FOLLOW PROPER PROCEDURE, AND NOT GIVE OUT TOO MUCH INFORMATION CAN REDUCE THE CHANCE OF YOUR OWN WORKERS BEING USED AGAINST YOU.
  • 19.
    TEST YOUR CAPABILITIESAND PROCESSES • RUN SIMULATIONS; TRY TO GAIN ACCESS TO YOUR OWN FACILITIES. IN THE SAME WAY COMPANIES WILL OFTEN SEND OUT FAKE PHISHING EMAILS AS TEST OF WORKERS' ATTENTION TO DETAIL, SEE IF YOUR WORKERS GIVE OUT INFORMATION OVER THE PHONE OR LET UNVERIFIED GUESTS IN.
  • 20.
    TOP CONSIDERATIONS FORPHYSICAL SECURITY PLANNING 1. IDENTIFY THE SCOPE OF YOUR PHYSICAL SECURITY PLANS. THIS SHOULD INCLUDE THE TYPES OF EMPLOYEES THE POLICIES APPLY TO, AND HOW RECORDS WILL BE COLLECTED AND DOCUMENTED. 2. DETERMINE WHO IS RESPONSIBLE FOR IMPLEMENTING YOUR PHYSICAL SECURITY PLANS, AS WELL AS THE KEY DECISION -MAKERS FOR MAKING ADJUSTMENTS OR CHANGES TO THE PLAN. 3. INCLUDE THE DIFFERENT PHYSICAL SECURITY TECHNOLOGY COMPONENTS YOUR POLICY WILL COVER. 4. STATE THE TYPES OF PHYSICAL SECURITY CONTROLS YOUR POLICY WILL EMPLOY. INCLUDE ANY PHYSICAL ACCESS CONTROL SYSTEMS , PERMISSION LEVELS, AND TYPES OF CREDENTIALS YOU PLAN ON USING. 5. LIST OUT KEY ACCESS POINTS, AND HOW YOU PLAN TO KEEP THEM SECURE.
  • 21.
    TOP CONSIDERATIONS FORPHYSICAL SECURITY PLANNING 6 . D E F I N E YO U R M O N I TO R I N G A N D D E T E C T I O N S YS T E M S . W H AT T Y P E S O F V I D E O S U RV E I L L A N C E , S E N S O R S , A N D A L A R M S W I L L YO U R P H YS I C A L S E C U R I T Y P O L I C I E S I N C L U D E ? I D E N T I F Y W H O W I L L B E R E S P O N S I B L E F O R M O N I TO R I N G T H E S YS T E M S , A N D W H I C H P RO C E S S E S W I L L B E AU TO M AT E D. 7 . O U T L I N E A L L I N C I D E N T R E S P O N S E P O L I C I E S . YO U R P H YS I C A L S E C U R I T Y P L A N N I N G N E E D S TO A D D R E S S H OW YO U R T E A M S W I L L R E S P O N D TO D I F F E R E N T T H R E AT S A N D E M E R G E N C I E S . 8 . S C O P E O U T H OW TO H A N D L E V I S I TO R S , V E N D O R S , A N D C O N T R AC TO R S T O E N S U R E YO U R P H YS I C A L S E C U R I T Y P O L I C I E S A R E N OT V I O L AT E D. 9 . C R E AT E A C Y B E R S E C U R I T Y P O L I C Y F O R H A N D L I N G P H YS I C A L S E C U R I T Y T E C H N O L O G Y DATA A N D R E C O R D S . I N C L U D E YO U R P O L I C I E S F O R E N C RY P T I O N , V U L N E R A B I L I T Y T E S T I N G , H A R DWA R E S E C U R I T Y, A N D E M P L OY E E T R A I N I N G . 1 0 . A D D R E S S H OW P H YS I C A L S E C U R I T Y P O L I C I E S A R E C O M M U N I C AT E D T O T H E T E A M , A N D W H O R E Q U I R E S AC C E S S TO T H E P L A N .
  • 22.
    THANK YOU FORLISTENING!