Physical Security Assessments. Tom Eston Spylogic.net



Similar documents
Targeted attacks: Tools and techniques

Introduction to Penetration Testing Graham Weston

What is Penetration Testing?

EXIN Information Security Foundation based on ISO/IEC Sample Exam

Read this guide and you ll discover:

Jumpstarting Your Security Awareness Program

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Physical Security to mitigate Social Engineering Risks

Course Title: Penetration Testing: Network & Perimeter Testing

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

How To Ensure Security At A Site Security Site

Remote Access Securing Your Employees Out of the Office

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Penetration Testing Report Client: Business Solutions June 15 th 2015

NAS103: Essentials of Network

Cyber Security for SCADA/ICS Networks

Five keys to a more secure data environment

Information Security Services

Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service

UCS Level 2 Report Issued to

Managing IT Security with Penetration Testing

Alternative Device Integration For Enhanced Security

Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014

Emergency Planning Guideline

Incident Response. Six Best Practices for Managing Cyber Breaches.

The Importance of Cybersecurity Monitoring for Utilities

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

ITAR Compliance Best Practices Guide

Cyber Watch. Written by Peter Buxbaum

Basic Computer Security Part 3

Does Your Local Business Need More Leads? Free Training Reveals How! By Nicole Munoz

Practical Steps To Securing Process Control Networks

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

SECURITY. Risk & Compliance Services

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Penetration Testing Services. Demonstrate Real-World Risk

Cyber Security Management

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

REAL SECURITY IS DIRTY

From the Lab to the Boardroom:

Network Security Forensics

11 Common Disaster Planning Mistakes

Penetration Testing. Presented by: Elham Hojati Advisor: Dr. Akbar Namin July 2014

Course Title Penetration Testing: Procedures & Methodologies

Taking Information Security Risk Management Beyond Smoke & Mirrors

13 Ways Through A Firewall What you don t know will hurt you

SECURITY SURVEY AND RISK ASSESSMENT. any trends or patterns in the incidents occurring at the school; the efficiency of the chosen security measures.

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients

Security Issues with Integrated Smart Buildings

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

BlackRidge Technology Transport Access Control: Overview

CCTV on IP Network. How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network. A Cisco on Cisco Case Study: Inside Cisco IT

Social Engineering Toolkit

Hackers are here. Where are you?

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

Wireless Network Security

3 day Workshop on Cyber Security & Ethical Hacking

Managing Network-related Risk for SMEs

13 Ways Through A Firewall

INTRODUCTION TO PENETRATION TESTING

Remote Monitoring offers a comprehensive range of services, which are continually

GET THE ALARM.COM ADVANTAGE.

CREDIT CARD SECURITY POLICY PCI DSS 2.0

Benefits of Big Data Analytics in Security Helping Proactivity and Value Creation. June 2015

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

Frequently Asked Questions

Firewalls for small business

How To Back Up Your Computer With A Hard Drive On A Usb Or Usb 2 (For Small Businesses)


HomeNet. Gateway User Guide

TABLETOP EXERCISE FACILITATOR S GUIDE:

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business

A BRAINSTORMING ON SECURITY FIRE DRILLS

Introduction to network penetration testing

Agenda , Palo Alto Networks. Confidential and Proprietary.

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Assignment 1 Biometric authentication

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

How To Be Successful With Social Media And Marketing

Policy for Protecting Customer Data

Transcription:

Physical Security Assessments Tom Eston Spylogic.net

Topics Convergence of Physical and Logical Assessment Methodologies Planning the Assessment Team Structure Reconnaissance Penetration Phase Walk Through Phase Lessons Learned

Penetration Test Definition Simulate the activities of a potential intruder Attempt to gain access without being detected Gain a realistic understanding of a site s security posture

Why conduct a physical security assessment? Assess the physical security of a location Test physical security procedures and user awareness Information assets can now be more valuable then physical ones (USB drives, customer info) Risks are changing (active shooters, disgruntled employees) Don t t forget! Objectives of Physical Security: Human Safety Confidentiality Integrity Availability Not limited by the size of an organization!

Convergence of Methodologies Network assessment methodology is identical (NIST 800-42): Planning Objective and Scope Discovery Remote and On-site reconnaissance Attack Penetration test and walk through Reporting Final report and lessons learned OSSTMM ( OSSTMM (Open Source Security Testing Methodology Manual)

The Security Map Visual display of the security presence Six sections of the OSSTMM Sections overlap and contain elements of all other sections Proper testing of any one section must include the elements of all other sections, direct or indirect * Security Map Pete Herzog, ISECOM

Planning the Assessment Critical Tasks What are we trying to protect at the locations(s)? List the critical assets (these can be your objectives if applicable) Rank them (high, medium, low) What are the threats to the locations(s)? Weather, Fire, High Crime Rate, Employee turnover

Planning the Assessment Who will conduct the assessment? Third party involvement Team members What is the scope? Process and controls Security awareness- Is the team challenged for ID? Removal of confidential customer information Steal laptop, proprietary information Social engineering included? Target selection Regional location, size of facility, dates (schedule well in advance)

Planning the assessment Escalation contact list continued Include in the authorization to test letter Walk through contact (very important) Facility person, security guard, department head They should not know when you are on-site! Do not forgot! The Authorization to Test Letter (aka: Get out of jail free card- literally!)

Authorization to Test Letter Example

Assessment Team Structure - Identify a team leader! Team Leader Handles all coordination Sets up meetings Central point of contact for feedback and problems Compile and document results Put together the final report Should be your most senior member to start out To avoid burn out rotate the team leader position!

Assessment Team Structure - Team Members Maximum of three internal team members Dependent on scope Assist with all phases if required Document results and observations (photos..good for keeping a log) Communicate issues or problems to the team lead (cell phone required!) Decide on third-party involvement Comfort factor Anonymity of the testing team $$$

Remote Reconnaissance Gather as much information as possible off-site! Floor plans from company documents Google Maps satellite views Google searches for news and information about the target location(s) Better yet use Maltego! http://www.paterva.com/web/maltego/ Number of employees at the locations(s) and listings Job functions, departments at the site (phone numbers) Security guards? Armed? Access Control - Card Readers? Photo ID s? Call or email the city building department for blueprints seriously!

Maltego for Reconnaissance Can be used to determine the relationships and real world links between: People Groups of people (social networks) Companies Organizations Web sites Internet infrastructure such as: Domains DNS names Netblocks IP addresses Phrases Affiliations Documents and files

On-site Reconnaissance 1/2 or 1 day is recommended for on-site recon At a remote location or region? Coordinate with the pen test team the night before to discuss the recon plan Two team members maximum Ensure you have authorization to test letters in hand! Things to observe: Building location, parking, traffic patterns Employee entrance procedures (smokers area?) Look for cameras and access control systems After hours procedures? Are things different at night?

Penetration Test Phase After on-site recon, determine the plan! Create multiple scenarios based on your objectives Some examples: Tailgate (easiest) Look like you belong (goes great with tailgating) Printer repair man I m late for a meeting! Chat with the smokers I I forgot my badge I m m here to see <INSERT NAME OF EXECUTIVE> Use a business card (faked) as ID Create a fake ID

Penetration Test Phase Continued Take photos if you can Use conference rooms to your advantage Be prepared to be compromised If you feel someone wants to challenge you quickly turn around and walk the other way! If you are asked for ID..fake it for a minute. If you think it s over, pull out the authorization letter. Be ready to make a phone call if needed Do not endanger yourself or others! (Beware of big dogs!)

Walk Through Phase Conducted after the penetration test Time frame depends on objectives and location One team member should be coordinating the walk through with the designated contact during the pen test Ensure you will have someone available No chance of pen test compromise Be prepared to escalate to management

Walk Through Phase Continued Conducted by at least two team members with the facility contact What are we looking for? Perimeter controls Confidentiality control of hard-copy data Internal access controls Cameras/Alarms Personnel practices (security awareness) Emergency procedures (evacuation) Fire extinguishers (expired?) OSSTMM is a good place to start for creating a physical security checklist No one standard, dependent on your organization

Walk Through Phase Continued Full Metal Jacket 1987 Warner Bros. Pictures Ask questions! Do you have any security concerns? Take notes and pictures Ask for permission prior to taking pictures Tell them about the penetration test Prepare for hostility! Put an awareness spin to it. Your not getting in trouble

Reporting and Lessons Learned Team Leader compiles notes and results from team members Prepare the final report ASAP Setup meetings shortly after the assessment with management of the facilities Don t t wait too long! You will loose the effectiveness of the assessment. Keep them in the loop Lessons learned with the assessment team! Setup a meeting include third-party if used What went well? What didn t?

Standards and Books OSSTMM Open-Source Security Testing Methodology Manual Version 2.2 http://www.isecom isecom.org/osstmm/ org/osstmm/ NIST 800-12 (Chapter 15 Physical Security) http://csrc.nist.gov/publications/nistpubs/800-12/ NIST 800-42 (Guideline on Network Security Testing) http://csrc.nist.gov/publications/nistpubs/800-42/nist-sp800-42.pdf Physical Security for IT Michael Erbschloe The Design and Evaluation of Physical Protection Systems Vulnerability Assessment of Physical Protection Systems Mary Lynn Garcia

Questions? Email: tom@spylogic.net