10 Physical Access Controls

 

This chapter covers

  • Security perimeters
  • Physical access controls
  • Physical authentication systems
  • Monitoring and logging of physical access

Physical assets, such as servers, network equipment, and cabling, are susceptible to unauthorized access, interference, tampering, or damage. If an attacker gains physical access to a space like a server room, they could directly install malicious software or tamper with equipment and network connections, leading to significant security breaches or service disruptions.

Cybersecurity professionals must understand the vulnerabilities of physical assets and take appropriate measures to protect them. This includes implementing security measures such as surveillance cameras, biometric access controls, secure locks, and restricted access zones. Properly understanding and deploying these physical security controls is crucial for preventing serious security incidents or disasters that could affect the organization’s infrastructure.

In this chapter. we will explore key concepts related to the protection of physical spaces, including the idea of security perimeters. We will also identify the physical security controls that can be effectively used to secure various types of assets within these perimeters.

10.1 Physical Access Protection

10.1.1 Security perimeters

10.1.2 Protecting the Outer Perimeter

10.1.3 Protecting the Inner Perimeter

10.1.4 Protecting Work Area Perimeters

10.1.5 Protecting Secure Area Perimeters

10.2 Physical Authentication

10.2.1 Sign-in and ID verification

10.2.2 Badge systems

10.2.3 Biometrics

10.3 Physical Access Monitoring

10.3.1 Security Guards

10.3.2 Security Cameras (CCTV)

10.3.3 Alarm Systems

10.3.4 Physical Access Logs

10.4 Summary