Physical Security Requirements. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)



Similar documents
Crime Central Station Burglary Alarm Systems

Learning Outcomes. Physical Security. Zoning systems. Zone 1 Open areas. Information Security

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

ISO IEC ( ) INFORMATION SECURITY AUDIT TOOL


MARULENG LOCAL MUNICIPALITY

FIRE SAFETY FOR OFFICE WORKERS

INTRUSION ALARM SYSTEM

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template

Human Intrusion. Natural Disasters* Attackers looking to perform some sort of damage or obtain useful information

ARE YOU READY FOR A DISASTER? THE ROAD TO PHYSICAL SECURITY

Security Control Standard

REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL CONTROL POLICY

Security Service de Services sécurité. Security Alarm Monitoring Protocol

TYPICAL FIRE SAFETY INSPECTION VIOLATIONS

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

Security Alarm Monitoring Protocol

SERIES ͲΝΒΣΞ ΒΟΘΖ Swann 2013

Understanding Sage CRM Cloud

ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems

Class A - Wood, paper, cloth, trash, plastics Solid combustible materials that are not metals. (Class A fires generally leave an Ash.

CISSP Exam Notes - Physical Security

Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution

Home Security Assessment Checklist DATE

Electronic Security. For Financial Institutions

State of Vermont. Physical Security for Computer Protection Policy

The Buhl Electric Secure Home. Brought to you by Buhl Electric. Security Packages and Options

Disaster Ready. By: Katie Tucker, Sales Representative, Rolyn Companies, Inc

Restaurant & café guide

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

East Mississippi Community College. Scooba Campus * Mayhew Campus Department of Public Safety. Campus Emergency Action Plan.

To Real Home Security

St. John s University

EMERGENCY PREPAREDNESS PLAN FOR

Physical Security. Paul Troncone CS 996

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 13 Business Continuity

Site Preparation Management Co., Ltd. March 1st 2013 By Nara Nonnapha, ATD UPTIME

Chippewa County Courthouse Security Emergency Procedures. Dial FIRE POLICE AMBULANCE

SITECATALYST SECURITY

integrated fire and security solutions Maximum protection for buildings

Prevention through Design: Eliminating Confined Spaces and Minimizing Hazards

Disaster Prevention and Protection Checklist

ADVANCED SECURITY SOLUTIONS

Information Technology Internal Controls Part 2

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry

Emergency Planning Guideline

Why home security is important. Contents

Service Children s Education

Appendix G. Security management plan

Risk Assessment Guide

SECTION I: REPORT OF INDEPENDENT SERVICE AUDITORS... 3 SECTION II: MANAGEMENT OF INTERNAP NETWORK SERVICES CORPORATION'S ASSERTION 5

hong kong//china data center specifications tel: fax: internet + intellectual property + intelligence

Guidance Notes FSR 2014

Integration of Visitor Management with Access Control Systems

Supply Chain Security Audit Tool - Warehousing/Distribution

SMOKE DETECTOR INSTALLATION PROGRAM The Burlington Ordinance Perspective

SOC 2 Report Seattle, WA (SEF)

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:

Residential Fire Safety Policies

Our repairs and maintenance service

Overview. Components of an alarm system Technology behind the equipment Communication Platforms Industry Terminology False Alarm Tips DSC products

Security Whitepaper: ivvy Products

SMART SENSOR COLLECTION

GSM ALARM SYSTEM USER MANUAL

Georgia Tech Aerospace Server French building Server Room. Server Room Policy Handbook: Scope, Processes and Procedure

800. Emergency Operations Policy and Safety Plan

FIRST ALERT INSTRUCTION MANUAL FOR FA 270 KEYPADS SECURITY SYSTEM

How To Ensure Security At A Site Security Site

How To Handle An Emergency At A Strata Corporation

SaaS architecture security

Physical Security Checklist and Inventory

SAP Cloud: Data Center Security SAP Cloud Data Center Strategy and Security Whitepaper

Does a fence or other type physical barrier define the perimeter of the facility?

Protection of unoccupied or void properties

Site Security Standards and Strategy

Workplace Fire Safety

INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY

BRANCH SECURITY REVIEW CHECKLIST

Understanding Alarm Systems

C-TPAT Self-Assessment - Manufacturing & Warehousing

Commercial or Business Security Survey

Frankfurt Data Centre Overview

STCC Contractor/Vendor Rules and Regulations

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Court Security Guidelines

Decree of the Ministry of the Environment. on fire safety of garages

Emergency Preparedness

Physical and Environment IT Security Standards

How To Protect A Water System

Risk Management Report

visit us on the web at:

Preventing arson in buildings

IAPE STANDARDS SECTION 5 FACILITIES

HISTOLOGY LABORATORY EMERGENCY PROCEDURES

U.S. Department of Housing and Urban Development Office of Public and Indian Housing. A Good Place to Live!

Course: Information Security Management in e-governance. Day 2. Session 3: Physical and Environmental Security

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

Transcription:

Physical Security Requirements Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Physical Security Requirements Protect against physical threats: Fire, smoke, water, earth movements, storms, sabotage/vandalism, explosion/destruction, toxic materials, equipment failure, theft, etc. Agenda: Site and facility design considerations Forms of physical access controls Environment and life safety 2

Site and Facility Design Considerations 3 There are several questions one should ask when building new or looking to buy facilities. These questions should be answered by technical and security professionals. The BCP team + security staff (e.g. guards, experts) is a good starting point.

Site and Facility Design Considerations Site Selection Cost, location and size are all important when selecting a site, but the security requirements must take precedence. Susceptibility to riots, looting, break-ins - areas with high crime-rate should be avoided. Environmental threats - fault lines, hurricanes regions, etc. should also be avoided. 4

Site and Facility Design Considerations Site Selection Proximity to other buildings and businesses what kind of attention do they draw? Proximity to emergency-response? Unique hazards in the area? Chemical plants, construction sites, etc. Is it nearby residential, business or industrial areas? 5

Site and Facility Design Considerations Site Selection What is the surrounding terrain? Would it be easy to approach the facility by vehicle or on foot without being seen? Single entrances are great for providing security, but multiple entrances are better for emergencies. Large corporations can afford to build campuses to control the surrounding area. Thick forest, easy to get close to building without being seen Concrete plate, can see approaching people early Building Building 6

Residential area Head office in Melbourne Two entrances, main and car park. 7

Site and Facility Design Considerations Facility design Internal security, including working areas and visitor areas, should be considered carefully. There should not be equal access to all locations within a facility. Anyone that enters the facility should have access to the restrooms, but not to the server rooms. Valuable and confidential assets should be located at the centre of protection. Entire building has equal access Visitors Mid Low clearance High Low clearance Low 8

Site and Facility Design Considerations 5 th floor 7 th floor Offices WC Call centre Offices Open area Kitchen Board room Kitchen WC Sofa room Information desk and lobby Elevator lobby Lunch room Server room Lobby Office WC 9

Site and Facility Design Considerations Facility design Walls and partitions can be used to compartmentalize working areas into security areas. This avoids shoulder surfing and eavesdropping. Floor to ceiling walls should be used to separate areas with different level of confidentiality. Only people with clearance corresponding to the classification of the work area should be allowed access. 10

Site and Facility Design Considerations Facility design Server rooms should have very high protection. No problem making them human incompatible Low lighting, loud noise, equipment stacked making it hard to manoeuvre. Designed to support optimal operation and block human access or intervention. Ensure that the walls to the server room has a one-hour minimum fire rating (i.e. slow penetration of fire). 11

Site and Facility Design Considerations Visitors Plan how to handle visitors: Assign an escort to visitor, their access and activities are monitored closely. This includes external contractors, such as plumbers. Failing to track visitors can lead to malicious activity. Design areas where visitors can roam freely, like lobbies etc. This is convenient for family and friends of employees. 12

Site and Facility Design Considerations Escorting ex-employees If an employee is immediately dismissed, possibly due to misconduct, then they should be escorted out of the building. Call centre In the board room the employees pass to the building should be taken. The employee should then be escorted down to the ground floor and let out of the building. Lunch room Kitchen Board room Server room Lobby Office WC 13

Forms of Physical Access Controls Fences, Gates, Turnstiles and Mantraps A fence defines a perimeter, they clearly differentiate areas that are under specific level of security. Barbed wire, concrete walls, invisible perimeters using motion and/ or heat detectors. A gate is a controlled exit and entry point in a fence. Use as few gates as possible Make sure that the deterrent factor is as high as the fence, i.e. do not use a simple easy to break gate for a 8 feet concrete wall. Turnstiles are gates that only work in one direction 14

Forms of Physical Access Controls Fences, Gates, Turnstiles and Mantraps A mantrap is a double set of doors that can be protected by a guard. The purpose is to immobilize a subject until he or she has identified and authenticated themselves. If the subject is authorized then the inner door is opened for access. If the subject is not authorized then both doors are looked until security personnel reach the area. Mantrap can include other security measures, such as metal detectors, scales to weigh the subject (to avoid piggybacking), and other forms of authentication. 15

Forms of Physical Access Controls Lighting Another type of perimeter defence: Discourages intruders who prefer to work in the dark (thieves etc.). Not very strong perimeter defence and should be used in combination with other mechanisms. Combined with guards, dogs, CCTV it can be very useful. Avoid lighting up other security mechanisms, so as to not give them away, such as guard posts, CCTV, etc. Strong lighting can cause glare in cameras and can disrupt other mechanisms, and so it should be avoided. 16

Forms of Physical Access Controls Security guards and dogs Most static mechanisms require that personnel at some point intervene. Security guards are there to intervene when something has happened. Guards can be used to monitor access or to watch surveillance monitors. Guards can adapt and make judgment calls. 17

Forms of Physical Access Controls Security guards and dogs Unfortunately security guards do not fit into all situations, and getting good guards that are reliable may not be easy. Subject to physical injury, illness, vacation, distractions, and vulnerable to social engineering. Only offer protection up to the point where their life is endangered. They are unaware of the scope of the operations within a facility, and are not equipped to respond to every situation. Security guards are very expensive. 18

Forms of Physical Access Controls Security guards and dogs Dogs are an alternative. They can be used as perimeter defence. Excellent at detection and deterring would-be intruders. Are however also expensive and require maintenance. 19

Forms of Physical Access Controls Keys and Combination locks Locks are designed to prevent access, and are a crude way of forcing identification and authentication: If you have the key or combination then you are who you say you are, and have certain rights. Key-based are cheap, but susceptible to picking and expensive to replace if somebody looses a key. Programmable combination locks are more expensive to invest in, but the code can be replace continuously. 20

Forms of Physical Access Controls Badges Badges, identification cards, and security IDs are forms of physical identification. Can be simple, a picture of the person owning the badge is placed on the badge. The badge is then showed to security personnel to gain entrance. Can be complex and include magnetic strips or RFIDs that allow the badge to be used as a key. At CAB you need a RFID equipped pass that lets you in to the building and controls which floors you have access to in the elevator. 21

Forms of Physical Access Controls Motion detectors Infrared motion detectors Measure changes in infrared light Heat-based motion detectors Measure changes in heat Wave pattern motion detectors Measure changes in reflections of microwave signals Capacitance motion detectors Measure changes in the electrical or magnetic field Photoelectric motion detector Changes in visible light Audio motion detector Listens for abnormal sounds 22

Forms of Physical Access Controls Intrusion alarms Whenever a motion detector registers a significant change it triggers an alarm. Deterrent alarm Shuts doors, engages additional locks, makes it harder to continue the attack Repellent alarms Audio siren or bell and turn on lights force attackers away. Notification alarms Usually silent, but record data about incident and notifies admin, security guards, law enforcements etc. Bring authorized personnel in hope of catching intruder. 23

Forms of Physical Access Controls Motion detection and Intrusion alarms As sensitivity of detection and alarms increase, false triggers occur more often. Animals, bugs, even authorized personnel may accidently trigger one system. It is advisable to combine multiple systems and require that two or more of them trigger in quick succession before the alarm is raised. 24

Forms of Physical Access Controls Access abuse Humans are experts at abusing security mechanisms Propping open secured doors Placing the mouse on the keyboard to avoid auto-logoff Same PIN or password for many applications/facilities Masquerading Using someone else s security ID to gain entry into a facility. Piggybacking Following someone through a secured gate or doorway. Using trails of logs, including when access was request, how access was used, and who requested access can be useful in reconstruct abuse events. 25

Forms of Physical Access Controls Emanation security Electrical devices emanate electrical signals that can be intercepted by unauthorized individuals. The signals may contain confidential, sensitive, or private data. Wireless networking, mobile phones, radio, etc. Using the right equipment, unauthorized users can interpret electromagnetic or radio frequencies and interpret the confidential data. 26

Forms of Physical Access Controls Emanation security Faraday cage A box, mobile room or entire building that is designed with an external metal skin, often a wire mesh. Skin is applied front, back, left, right, top and bottom. This skin prevents electromagnetic signals from exiting or entering the area that the cage encloses. 27

Forms of Physical Access Controls Emanation security White noise Broadcast false traffic at all times to mask or hide the presence of real emanations. Use an existing real signal that is not confidential A constant signal, or random noise Maybe not as effective as a Faraday cage, but much cheaper 28

Environment and Life Safety Electricity Electricity does not only keep IT running, but also keeps air conditioning, fans, heating, etc. that can be crucial for personnel in some environments. UPS is not only for IT but can also be used for environment systems. Temperature, Humidity and Static Server rooms should have a temperature between 15 to 23 degrees Celsius. Humidity needs to be controlled: high humidity causes corrosion, low humidity causes static electricity. Non static carpeting in low humidity environments can still generate static charges enough to do permanent circuit damage. 29

Environment and Life Safety Water Server rooms should be placed away from water, and no water pipes should run through the server room. Call centre Water and electricity spells disaster for the components, but it also poses a very real risk to personnel that may be electrocuted. Kitchen Board room Server room Office 30 If the dishwasher breaks and floods the kitchen then it may run into the server room if there is clearance under the doors. Lunch room Lobby WC

Environment and Life Safety Water Do not focus solely on plumbing leaks, but also consider flooding when placing the server room (maybe the basement isn t the best place for the server room). Ground floor is not a great idea either, as it is usually easier to break into rooms on the ground floor. Some recommend the absolute middle of the building, but there are other things to consider (ventilation, etc.). 31

Environment and Life Safety Fire prevention, Detection and Suppression The fire triangle demonstrates the different ways one can suppress fire. Heat Water suppresses temperature. Dry powders suppress fuel supply. CO 2 suppresses oxygen supply. Halon subsitutes and other nonflammable gases interfere with the chemistry of combustion. Oxygen Chemical reaction Fuel Selecting a suppression medium should include considering the fire triangle, what are you trying to achieve? 32

Environment and Life Safety Personnel awareness of fire is key, as it is much easier to extinguish a fire in its early stages. Once the fire has hit stage 4 everything in the area is burning and it is to late to salvage anything. Temperature Smoke Flame Heat Select extinguishers carefully, you can not use a water extinguisher on burning liquids, as they splash the liquid and usually the liquid floats on water. Incipient Time 33

Environment and Life Safety There are automatic fire detection systems that can trigger when a piece inside of them melt or when they detect high speed temperature increase. This usually triggers an alarm, but can also trigger automatic extinguish. Water sprinklers are common in areas were people are working: They can be prefilled with water, ready to dispense at any time (but can leak) They can be dried and filled first when the alarm is raised (slower but not prone to leaks) Exists combinations, where pre-alarms fill the pipes and then the emergency alarm releases the water. 34

Environment and Life Safety There are automatic fire detection systems that can trigger when a piece inside of them melt or when they detect high speed temperature increase. This usually triggers an alarm, but can also trigger automatic extinguish. For server rooms it is preferable to use gas based extinguishers. Gas discharge systems usually remove oxygen from the air. This can be hazardous for humans, and should therefore never be used in an environment where personnel exists. Excellent for server rooms, but some gases are not environment friendly and may be illegal. 35

www.liu.se