PHYSICAL SECURITY. A Primer and a Story of Why it s Necessary



Similar documents
State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

FFIEC Cybersecurity Assessment Tool

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

Payment Card Industry Data Security Standard

Cybersecurity. Are you prepared?

White Paper An Enterprise Security Program and Architecture to Support Business Drivers

The Value of Vulnerability Management*

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0

Information Security Program

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

CCTV Cameras Policy. Policy Guidelines

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

ISO Controls and Objectives

Managing IT Security with Penetration Testing

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

Threat Management: Incident Handling. Incident Response Plan

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Data Breach and Senior Living Communities May 29, 2015

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Setting the Standard in Risk Management Consulting and Investigation Services

DEFENSE SUPPLY CHAIN SECURITY & RISK MANAGEMENT: PRINCIPLES & PRACTICE

Threat Modeling. 1. Some Common Definition (RFC 2828)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Guidelines 1 on Information Technology Security

Nine Steps to Smart Security for Small Businesses

SECURITY. Risk & Compliance Services

Network & Information Security Policy

Security Guidelines for. Agricultural distributors

SANS Top 20 Critical Controls for Effective Cyber Defense

U.S. DoD Physical Security Market

Security Risk Assessment

IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities

Subject: National Preparedness

HIPAA Security Alert

How to Solve the Most Persistent Problem in Perimeter Security Systems

Microsoft Services Premier Support. Security Services Catalogue

WhiteHat Security White Paper. Evaluating the Total Cost of Ownership for Protecting Web Applications

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Cybersecurity Workshop

SECURITY SOLUTIONS BANKING AND FINANCE

Advantages of Managed Security Services

Privilege Gone Wild: The State of Privileged Account Management in 2015

Procedure for Managing a Privacy Breach

The problem with privileged users: What you don t know can hurt you

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Computer Forensics Preparation

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance

Cyber Risk to Help Shape Industry Trends in 2014

The Business Case for Security Information Management

Homeland Security for Schools: Threat Status Alert Worksheet

The Impact of HIPAA and HITECH

Security Is Everyone s Concern:

Aftermath of a Data Breach Study

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Operational Risk Management Policy

NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division

Privilege Gone Wild: The State of Privileged Account Management in 2015

SecurityMetrics Vision whitepaper

AUTOMATED PENETRATION TESTING PRODUCTS

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach

Computer Forensics for CEO s and Managers

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Cyber Security An Exercise in Predicting the Future

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 125. When Disaster Strikes Are You Prepared?

Cybersecurity: Protecting Your Business. March 11, 2015

Security Criteria for C-TPAT Foreign Manufacturers in English

Information Technology Security Review April 16, 2012

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

Getting real about cyber threats: where are you headed?

INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy

Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI

ISO Information Security Management Systems Foundation

Third-Party Access and Management Policy

The Geospatial Approach to Cybersecurity: An Executive Overview. An Esri White Paper January 2014

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

Operational Risk Publication Date: May Operational Risk... 3

Top 10 Cloud Risks That Will Keep You Awake at Night

Transcription:

PHYSICAL SECURITY A Primer and a Story of Why it s Necessary

1 What Is PhySec? Physical Security consists of physical, logical and design measures which protect people, physical property and other assets from harm, unauthorized access, usage, tampering, and theft.

2 Why Is PhySec Needed? Physical Security is put in place to help prevent more accurately, to deter crimes of opportunity as well as safeguard life. PhySec can also complement mitigating business liability by applying controls to known areas of possible physical risk.

3 Characteristics of a Sound PhySec program Physical Security can consist of many different elements which directly or indirectly address areas of perceived risk. Common elements of Physical Security Programs include: Deterrence Active detection and monitoring Delay progress of criminal or other unwanted behavior Incident response to alarms, alerts or attacks Recover business or operational status as quickly as possible following an incident

4 Characteristics of PhySec Deterrence PhySec controls build in deterrence as preventative measure. Deterrence is the initial attempt to thwart unwanted behaviors to include criminal activities through out the facility(s) being safeguarded. Active detection and monitoring Active detection and monitoring can be viewed as overt, or intended to be seen, and covert or concealed. Monitoring is designed to provide early warning of possible security events, evidentiary value used for criminal or civil proceedings.

5 Characteristics of PhySec Delay Delaying controls help limit or slow the progress of a breach, compromise, attack or other unwanted behavior. Incident response Recover business or operational status as quickly as possible following an incident. Recovery Recover business or operational status as quickly as possible following an incident.

6 Security Requirements To ensure the PhySec program is adequate; initial requirements should be outlined in order to better understand where to prioritize resources, budget and time.

7 Security Requirements 1.) Determine applicable threats or risks. Identify applicable threats and risks associated with the organization to include proximity to the organization. Ensure risk assessments take into account: o Surrounding businesses o Local infrastructures o Geographic areas of interest o Local environmental conditions o Geopolitical climate

8 Security Requirements 2.) Assess vulnerabilities which could allow threats or risks to affect personnel or operations. Once threats and risks have been identified; investigate and understand how those threats and risks, if capitalized on, would affect the organization. Ensure PhySec controls are appropriate for the identified vulnerabilities.

9 Security Requirements 3.) Compile a list of assets with associated value List should indicate value, the value of the asset will be used in determining resources available. Life is of utmost value and inherently priceless. Protection of life is THE top priority. Value is not always a monetary figure. Value can include the organizations commitment to availability and critical services provided by the organization.

10 Security Requirements 4.) What if scenarios - Examine and plan for failures in the PhySec plan. Determine what the impact will be when PhySec controls fail.

11 Security Requirements 5.) Determine cost of security vs. actual cost of asset to be safeguarded Cost of PhySec controls aren t always black and white. Cost of equipment Cost of installation Cost of training Cost of liability for not having or having enough PhySec in place

12 Security Requirements 6.) Ensure installation and maintenance considerations are taken into account. Installation of PhySec controls can itself introduce security gaps. Reliance on temporary PhySec equipment vs. long term equipment may save money initially but may incur extra expenditures to maintain for long periods of time. Evaluate short term vs. long term needs and plan accordingly appropriate installation and support contracts.

13 Security Requirements 7.) Ensure PhySec implementations are complementary to business operations. PhySec systems must adapt to the organization. Different times or shifts may have different PhySec requirements. PhySec should meet the organizations requirements while minimizing the impact on daily business. PhySec which is too overly cumbersome will not be utilized to the fullest by the organization.

14 Security Requirements 8.) Security should include seen and unseen measures which provide overall PhySec safeguards. PhySec which is seen provides an initial deterrent. Some deterrents are meant to be seen as to provide misdirection or obfuscate covert PhySec controls. Overt PhySec controls often times provide organizational employees with a sense of security. Covert PhySec controls should work in a complementary manner with overt controls.

15 Security Requirements 9.) Simplify PhySec controls in order to lesson human error. Ensure that staff and security personnel have sufficient training in order to safely and efficiently operate the organizations security apparatus.

16 Security Requirements 10.) PhySec controls are a long-term commitment; ensure PhySec takes into account future growth. Take into account physical changes or additions to the organizations structure. Licensing considerations for PhySec software controls.

17 Changing The Mindset PhySec is the implementation of an organization's active response to areas of assessed risk. PhySec should not be a hurdle or roadblock, rather it should be used to help shape and modify behaviors.

18 Changing The Mindset Often times Information Security and Physical Security officers are seen as the office of NO. Implementation of appropriate PhySec controls which support the business and its customers is a critical balancing act. Too little PhySec exposes the business to elevated risks. Too much PhySec creates business obstacles which can impact productivity and profitability.

19 Incidents PhySec Should Address Incidents PhySec programs should address through logical, physical and design controls: Policy / Procedure violations Natural disasters Rogue or trusted insider risks Workplace violence Unauthorized entry / Trespassers Criminal acts internal / external Industrial disasters Civil disturbances Terrorism

Case Study 20

Case Study Large National Bank This stuff happens to the big guys as well Services provided around the country National branch and service location footprint Retail and commercial services Mortgage services Merchant services E-banking Growth primarily through acquisition

Case Study Large National Bank Great Candy for attackers Hard outer shell Great Perimeter network security Banner replacements for open ports Outsourced web services to well known, SSAE16 backed companies Proxy server in place for staff to utilize when connecting out

Case Study Large National Bank Great Candy for attackers Soft, chewy center Terrible internal and physical security Open network between lines of business Complete lack of physical security controls Mortgage service centers in particular Examples to follow

Case Study Large National Bank Physical controls were leveraged against the bank s information To great results for the attacker We infiltrated EVERY physical location without breaking a sweat Branches included We were able to gather client and employee data right from the desks of the information owners Offered lunch in one facility Terrible results for the bank

Q&A

THANK YOU! Questions? edward.vasko@tvrms.com Office: 480-840-1744 info@tvrms.com http://www.tvrms.com