GATES, GUARDS, AND GADGETS: AN INTRODUCTION TO THE PHYSICAL SECURITY OF IT



Similar documents
Physical Security. Paul Troncone CS 996

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

Physical Security for Drinking Water Facilities

Protecting datacenters & mission critical facilities - using IP based systems. Presented by: Jeffrey Lam RCDD Director, Global Accts, Asia ANIXTER

Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response

Introduction. Industry Changes

Does a fence or other type physical barrier define the perimeter of the facility?

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings

Palm Beach County Sheriff s Office

Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland

Advanced Fencing and Security Technologies Ltd

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Supply Chain Security Audit Tool - Warehousing/Distribution

Security at San Onofre

Contents TABLE OF. List of Illustrations... IX. Preface... XV. Chapter 1: How the Burglar Breaks into Your Home... 1

Conducting Security System Site Surveys

Site Security Standards and Strategy

Physical Security: From Locks to Dox

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Integrated Physical Security and Incident Management

Winning Initiatives and Best Practices for Physical Security

Electronic Security. For Financial Institutions

Current as of 11/10/08 1 of 1

Middleborough Police Electronic Security Narrative

Chapter 1 Introduction

ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION

This directive establishes Department of Homeland Security (DHS) policy regarding the physical protection of facilities and real property.

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Why All Data Centers are Not Created Equal

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

CDW Advanced Image Deployment Service Customer Guide

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

INTRUSION ALARM SYSTEM

How To Ensure Security At A Site Security Site

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Business Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco.

Guidance Notes FSR 2014

U.S. DoD Physical Security Market

Axis network cameras A wide portfolio of products for professional video surveillance.

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Security for Railways and Metros

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template

Security Guidelines for. Agricultural distributors

UBC Technical Guidelines Section Edition Secure Access: General Standards Page 1 of 7

MONROE POLICE DEPARTMENT

REVEWED BY: Ross Rogien B.O/P.R. ADDITIONAL REVIEW(S) REQ.-FIRE DEPT Y/N

How to Solve the Most Persistent Problem in Perimeter Security Systems

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:

Building Integration System Your platform for customized security and safety management

Security Criteria for C-TPAT Foreign Manufacturers in English

WEBFIL LIMITED. Your Security Partner

Commercial or Business Security Survey

IP Surveillance. Presentation for BICSI Regional Conference Troy, Michigan March 15, Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base

Building Integration System Your platform for customized security and safety management

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business

Seventh Avenue Inc. 1

3.0 Nonsystem Based Design Descriptions and ITAAC

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

Nuclear Plant Security Systems

How to secure your property after a disaster


AIO Remote Site Security Solution

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

DIVISION 28 ELECTRONIC SAFETY AND SECURITY

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

ABSOLUTE SECURITY. IVRI Group. Corporate Profile December 2012

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/ Officer: Case No:

A S I S I N T E R N A T I O N A L. Facilities Physical Security Measures ASIS GDL FPSM-2009 GUIDELINE

Axis IP surveillance. Endless possibilities for video surveillance.

Security Technology. Virtual

Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai

1.4 The banking entities that provide customer service will keep controls of access to the premises.

>>IP. VIDEO INTERCOM & SMART HOME TCP/IP video intercom solution expert

FLORIDA STATE UNIVERSITY PURCHASING DEPARTMENT A1400 UNIVERSITY CENTER TALLAHASSEE FL ADDENDUM ACKNOWLEDGMENT FORM. DATE: December 8, 2011

AKCess Pro Server Management Software

SC100 Series Seismic Vibration Sensors. The Best Way to Protect High-Risk Commercial Assets

Home Security Assessment. Harden the Target Lessen the Risk

Chain Link Fence Manufacturers Institute Security Fencing Recommendations

Check Your Home Security

Walking and Working Surface Checklist:

Section 2.2 Locks and Keys. Legal Notice

CMPD Home Security Newsletter

Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns

Questions related to specific materials, methods, and services will be addressed at the conclusion of each presentation.

Global Supply Chain Security Recommendations

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Transcription:

GATES, GUARDS, AND GADGETS: AN INTRODUCTION TO THE PHYSICAL SECURITY OF IT Kai Axford, MBA, CPP, CISSP, ACE Manager, IT Security Services Accretive Solutions kaxford@accretivesolutions.com

THIS SESSION WILL NOT Tell you to lock your PC, when you leave Be dull and dry Turn you into a physical security guru

THIS SESSION WILL Serve as a intro to aspects of Physical Security you may not have previously considered. Remember convergence! Cover a lot of topics and controls Give you a chance to see (and feel) some of the controls Allow you to develop and discuss the topic intelligently with your physical security teams.

WHY DO YOU EVEN CARE? Because the physical breach is only a means to an end. If I can bypass your 17 Internet facing, application layer firewalls, it cuts down on the amount of leet ness I need to possess. Physical access is KEY.

<DEMO> 1337 PLUG PWNAGE

AGENDA You don t know what you don t know No such thing as de-perimeterization In it to win it. No place like 127.0.0.1

AGENDA You don t know what you don t know No such thing as de-perimeterization In it to win it. No place like 127.0.0.1

A QUICK REVIEW OF DEFENSE IN DEPTH Physical Security

WHAT IS PHYSICAL SECURITY? The part of security concerned with the measures/concepts to safeguard personnel; to prevent unauthorized access to equipment, installations, materiel, and documents; and to safeguard them against espionage, sabotage, damage, and theft. 1 1 Erbschloe, Michael. Physical Security for IT. 2005. (Elsevier Digital Press.)

PHYSICAL SECURITY CONCEPTS: 4D Detect Deter Delay Deny

YOUR PHYSICAL IT SECURITY FUNCTION SHOULD WORK WITH Corporate Security IT Security Network Security Law Enforcement Private Security Consultants or Staff

PHYSICAL SECURITY STARTS WITH A PLAN Security Assessment Overview and Mission Statement Organizational Responsibilities Duty Officers Contact Lists Security Procedures for Datacenter Department Servers Laptops and many more!

AGENDA You don t know what you don t know No such thing as de-perimeterization = THE PERIMETER Site Selection Barrier Planning Structural Barriers Fences and Wire and Gadgets!! In it to win it. No place like 127.0.0.1

THE PERIMETER Build New or Use Existing Think CPTED! Three Rule of Real Estate = Location.Location.Location City? Inner city? Wooded area? Open Space area?

THE PERIMETER What most people think of when we say physical security. Defined as a natural or manufactured obstacle to the movement of persons, animals, vehicles or materials. Designed to stop 3 types of penetration: By Accident Oops! Wrong place. By Force Here I come! Try and stop me! By Stealth Shhhh I m a ninja. Do your threat assessment! There is no such thing as a foolproof barrier. It s not if.it s when.

THE PERIMETER What most people think of when we say physical security. Includes things like concrete barriers (aka cement planters ) or bollards. But do they work? Do they delay or deter? Concrete barrier? Bollards?

THE PERIMETER Chain Link No less than 7 feet 9 Gauge or heavier No more than 2 between mesh openings Weld your hardware! Include a top guard. Barbed Wire is not Barbed Tape! Think Razor Ribbon! Wrought Iron looks much better but does it work?

THE PERIMETER Under vehicle inspection systems License plate readers

BAD GUY BREAK Blueprints This was made public. Satellite imagery Nice photos of your facility. Does anyone know what this place is?

AGENDA You don t know what you don t know No such thing as de-perimeterization In it to win it = THE MIDDLE LAYER Think INSIDE the box! Doors Windows What did you not think about? No place like 127.0.0.1

THE MIDDLE LAYER Think INSIDE the box! Doors Windows What did you not think about?

MIDDLE LAYER Everything is better in 3-D! You must consider top and bottom not just the four walls. It s not a tough mission, nor is it an impossible task. It s not fantasy. This stuff really happens.

MIDDLE LAYER Doors are obvious threat vectors and need to be reinforced Consider electrical and mechanical means Man traps, turnstiles, etc. are also very effective http://www.turnstiles.us/

MIDDLE LAYER Tempered Glass v. Laminated Glass Plastic v. Acrylic v. Glass Also consider bars, heavy steel mesh, etc. Any window less than 18 from the ground is at risk A bad Apple makes the point

MIDDLE LAYER Did you forget. HVAC access Sidewalk elevators Utility tunnels Storm sewers Storm doors Piers, docks, and wharves Because these guys probably did not

AGENDA You don t know what you don t know No such thing as de-perimeterization In it to win it. No place like 127.0.0.1 = THE INNER LAYER IP Surveillance Alarms and Sensors Locks Safes & Vaults

THE PERIMETER It s called **IP** surveillance so what s the impact on your network? Is the physical security function really going to run their own cable and hubs? Or will they just piggyback on yours? Video analytics are the true rockstars.

<DEMO> IP VIDEO SURVEILLANCE

THE PERIMETER Hardware Field of View Power Source (PoE) Resolution (VGA, Megapixel) Day/Night Scalability Camera placement Network Bandwidth Frames per Second (FPS) Storage requirements Software Video analytics

INNER LAYER Electro-Mechanical Metallic Foil Magnetic Switches Pressure Mats Volumetric Capacitance Vibration Microwave Ultrasonic Passive IR Photo Electric

INNER LAYER They are only delaying mechanisms No lock is perfect Various types Wafer locks Pin Tumbler locks Cipher locks Code and card operated locks Padlocks

INNER LAYER It s not guys like this who will breach your perimeter. more likely it s a guy like Jesse. A key control program is critical! Change locks and padlocks every 12 months or less.

INNER LAYER Categories Fire Resistant Burglary/Robbery Sensitive UL provides safe ratings for both Classificat ion Temperatu re Time 350-4 2000 F 4 hr 350-2 1850 F 2 hr 350-1 1700 F 1 hr 150-4 2000 F 4 hr 150-2 1850 F 2 hr 150-1 1700 F 1 hr Classification Resistance Time TL-15 Tool 15 min TL-30 Tool 30 min TRTL-30 Tool/Torch 30 min TRTL-30x6 Tool/Torch 30 min TXTL-60 Tool/Torch/Explo sive 60 min

SUMMARY Detect, Delay, Deny, Deter Perimeter, Middle, Inner Layers Work together. You have a common goal. Stay alert! (especially if you see some guy buying 125 pounds of ANFO and 62 pounds of steel nuts!)

TRACK RESOURCES Erbschloe, Michael. Physical Security for IT. 2005. Elsevier Digital Press. PwnPlug Grep8000 - Rocket Bear Labs http://grep8000.blogspot.com ASIS International. Protection of Assets (POA) Manual, Vol I - IV. 1999. Deviant Ollam Lockpick Sage http://deviating.net/lockpicking The Open Organization of Lockpickers (TOOOL) http://toool.us Thanks to these vendors for their support! RazorRibbon - http://www.razorribbon.com ShatterGARD - http://www.shattergard.com

QUESTIONS? Kai Axford, MBA, CPP, CISSP, ACE Manager, IT Security Services Accretive Solutions kaxford@accretivesolutions.com