Physical Security to mitigate Social Engineering Risks



Similar documents
Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

How To Ensure Security At A Site Security Site

Customer Guide to the DATAONE Datacenter

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings

Vendor Risk Assessment Questionnaire

Supplier Information Security Addendum for GE Restricted Data

A Human Factor Interface for SIEM

Techno Security's Guide to Securing SCADA

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy

Security of Paper Records & Document Shredding. Sponsored by Cintas. Independently conducted by Ponemon Institute LLC Publication Date: January 2014

HIPAA Security Alert

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Data Security Concerns for the Electric Grid

Description: Objective: Attending students will learn:

CASE STUDY OF INDUSTRIAL ESPIONAGE THROUGH SOCIAL ENGINEERING

Physical Security Assessments. Tom Eston Spylogic.net

Intermec Security Letter of Agreement

Practical Steps To Securing Process Control Networks

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

School Security: What are you missing?

Physical Security: From Locks to Dox

The second section of the HIPAA Security Rule is related to physical safeguards. Physical safeguards are physical measures, policies and procedures

SOC 2 Report Seattle, WA (SEF)

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

Integration of Visitor Management with Access Control Systems

SECURITY CONSIDERATIONS FOR LAW FIRMS

Section 12 MUST BE COMPLETED BY: 4/22

Guide to Preventing Social Engineering Fraud

Cybersecurity Governance Update: New FFIEC Requirements cliftonlarsonallen.com

C-TPAT Self-Assessment - Manufacturing & Warehousing

MARULENG LOCAL MUNICIPALITY

Information Technology Security Review April 16, 2012

HIPAA Security. assistance with implementation of the. security standards. This series aims to

C-TPAT Importer Security Criteria

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

PCI (Payment Card Industry) Compliance For Healthcare Offices By Ron Barnett

Understanding Sage CRM Cloud

Middleborough Police Electronic Security Narrative

Network Security Forensics

Supply Chain Security Audit Tool - Warehousing/Distribution

Network Security Assessment

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

PCI Data Security and Classification Standards Summary

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

IT - General Controls Questionnaire

Protecting datacenters & mission critical facilities - using IP based systems. Presented by: Jeffrey Lam RCDD Director, Global Accts, Asia ANIXTER

HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

Seventh Avenue Inc. 1

FERPA: Data & Transport Security Best Practices

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

The Human Factor of Cyber Crime and Cyber Security

Supplier Security Assessment Questionnaire

Healthcare Security Solutions. Building Technologies

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

BYOD: End-to-End Security

Integrated Physical Security and Incident Management

INCIDENT RESPONSE CHECKLIST

Solutions and IT services for Oil-Gas & Energy markets

PII Compliance Guidelines

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

State of Vermont. Physical Security for Computer Protection Policy

REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Retention & Destruction

U.S. DoD Physical Security Market

Physical Security Assessment Form

Hacking Techniques & Intrusion Detection

The Importance of Cybersecurity Monitoring for Utilities

Business Continuity Management

Contra Costa Community College District Business Procedure SECURITY CAMERA OPERATING PROCEDURE

Surveillance Equipment

IS-906: Awareness. Visual 1 IS-906: Workplace Security Awareness

Cyber Security Metrics Dashboards & Analytics

Footprinting and Reconnaissance Tools

Transcription:

2013 Cl iftonlar Physical Security to mitigate Social Engineering Risks cliftonlarsonallen.com

Agenda Background and statistics of physical security Address social engineering risks associated with deficiencies in physical security Explain attacker motivations Identify sound physical security measures to protect critical assets Summarize key areas of control your organization should have in place to improve the security posture 2

Physical Security It s kind ofa big deal... The worldwide market for physical security was valued at $48 billion in 2012 and is projected to reach the market size of $125 billion by 2019 1. 1 http://www.transparencymarketresearch.com/physical security market.html 3

Andthewinners are... Video Surveillance was the largest market and held about 72% share in 2012 with a forecast to continue that rapid growth 2 Biometrics held the largest market and held about 38% share in 2012 3 Trivia time... What industry is the largest end user of physical security? 2, 3 http://www.transparencymarketresearch.com/physicaltransparencymarketresearch com/physical security marketsecurity market.html 4

Identify what needs tobe protected People Information Equipment Facilities 5

Defense in Depth The concept of protecting a computer network with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart t an attack. Not enough to just secure your network 6

Social Engineering Risks 7

Social Engineering Hacking the human Simply put, Social Engineering is the exploitation of human nature. Highest risk for these attacks? New employees [60%] Contractors [44%] Executive assistants [38%] 8

Several different attackvectors Online Telephone Waste Management Personal approaches Reverse social engineering 9

Recon... Google it The information gathering process is critical. The internet can provide a host of information essential to performing a successful social engineering attack Google images Facility access, entrances Type of access control used Employee information Information is a dangerous weapon. Adds legitimacy where there is none 10

Tailgating Gaining access to a physical access facility by means of coercion or manipulation or simple entry Total bypass of physical security Employees and vendors avoid confrontation Attributed to deficient or lack of access restriction, lack of security awareness Cigarettes are a social engineer s best friend. 11

Shoulder Surfing Direct observation Effective in public areas Access to confidential information Attributed to deficient privacy features, improperly restricted areas 12

Dumpster Diving Looking for information discarded by company employees Typically done after hours Reconnaissance has likely been done prior to attack Attributed to lack of access restrictions, deficient disposal procedures One man s trash is a social engineer s treasure. 13

Motives Other motivators include knowledge, curiosity, ego, social acceptance and pure entertainment (base jumping) 14

2013 Clif ftonlar Defensive measures to prevent Social Engineering attacks cliftonlarsonallen.com 15

Types ofphysical Security Intrusion Detection/Prevention Alarms, Video Surveillance Access Control Locks, Access control, Visitor control 16

Video Surveillance Video Surveillance is one of the oldest physical security measures available Now running on same IP network as other apps Must be securely configured Real time monitoring Unattended cameras simply aid in forensics Placement is key All entrances, work areas, inside and outside of data center 17

Alarms Perimeter and Internal Various sensors can be implemented Police response Time of day restrictions can be enforced Alarm codes should be unique for each employee Access isrestricted using ACL 18

Access Control, it s not just an IT problem Relationship with facility management Access review should occur regularly Time of day restrictions Layered security Discuss options with vendor 19

Radio Frequency ID Cloning (RFID) 3 levels of frequency Low(LF) cloned within 3 ft High(HF) cloned within 3 10 ft Ultra High (UHF) cloned within 30 ft Most access control utilizes passive low frequency RFID technology Discuss options with vendor 20

Locks Virtually any key lock can be picked If you MUST have key locks, implement additional controls Inventory of keys needs to be maintained Electronic locks are best Access codes should be unique for each employee Access is centrally managed 21

Visitor Control Guards Human eyes are often better Visitors announced and escorted Sign visitor log Wear visitor badge (preferably automated access control) Implement compensating controls 22

Controlling Paper Locked shred bins Vendor picks up and shreds onsite Certificate of destruction is provided Clean desk policy Random walkthrough for compliance Employee awareness Secure dumpster area 23

Summary Layered security is best Security is a culture Validate your security Security awareness is key

ftonlar 2013 Clif Pete Storm Senior Associate, Information Security Pete.Storm@claconnect.com 612 397 3070 Laura Faulkner Manager, Information Security Laura.faulkner@claconnect.com 267 419 1165 cliftonlarsonallen.com twitter.com/ CLA_CPAs facebook.com/ cliftonlarsonallen linkedin.com/company/ cliftonlarsonallen 25