34
McGraw-Hill/Irwin McGraw-Hill/Irwin Copyright Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Information Assurance for the Enterprise: Information Assurance for the Enterprise: A Roadmap to Information Security A Roadmap to Information Security , by Schou , by Schou and Shoemaker and Shoemaker Chapter 8 Physical Security

Chapter008

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Chapter008

McGraw-Hill/IrwinMcGraw-Hill/Irwin CopyrightCopyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.© 2007 by The McGraw-Hill Companies, Inc. All rights reserved.

Information Assurance for the Enterprise: Information Assurance for the Enterprise: A Roadmap to Information SecurityA Roadmap to Information Security, by Schou and Shoemaker, by Schou and Shoemaker

Chapter 8

Physical Security

Page 2: Chapter008

8-8-22

Objectives

Manage the problems of dispersion and diversity Factor the concept of secure space into a

physical security scheme Construct a security process using a security

plan Mitigate physical security threats

Page 3: Chapter008

8-8-33

Physical Security

Physical security safeguards assets from non-digital threatsProtects information processing facilities and

equipment from deliberate or accidental harmMore involved and complexEssential to protecting information asset base

Uncontrolled physical space makes it easy for an attacker to subvert most security measuresProximity to the equipment allows attackers to

mount attacks more easily

Page 4: Chapter008

8-8-44

Problems of Dispersion and Diversity

Physical security accounting and controlling processes have become more difficult with the advent of distributed systemsDifficult to secure effectively because network

resources are diverse and widely distributedExternal parts of a network

• Telephone, cable lines, broadband interface

Protection of less obvious non-computerized information repositories

Page 5: Chapter008

8-8-55

Problems of Dispersion and Diversity

Collections of assets have different protection requirements

Establishing safeguards: Physical asset accounting framework that

itemizes the physical records and resources This framework requires maintaining a perpetual

inventory of tangible assets as well as rules for controlling each asset

• Combination of a defined set of assets and the associated controls is called secure space

Page 6: Chapter008

8-8-66

The Joy of Secure Space

Safeguarding a facility requires deliberately creating a secure spaceDefine physical perimeter or boundaryDeploy countermeasures to assure the security,

confidentiality, and integrity of the itemsDelineate the boundary of all controlled locationsFactors to be considered in establishing a secure

space:• Location• Access• Control

Page 7: Chapter008

8-8-77

The Joy of Secure Space

Factor 1: Ensuring the locationSecure physical assets proportionate to the risks

resulting from unauthorized access to that facility Factor 2: Ensuring controlled access

Access is a privilege, which is individually assigned and enforced, rather than a right

Factor 3: Ensuring control of secure spaceBased on the specification and enforcement of a

set of behaviors that can be objectively monitored

Page 8: Chapter008

8-8-88

Physical Security Process and Plan

Physical security processGuarantees that the effective safeguards are in

placeEffectiveness is ensured by making certain that:

• Threats have been identified• Associated vulnerabilities have been accurately

characterized, prioritized, and addressed

Implemented through planningSupervised and enforced by consistent and

ongoing management

Page 9: Chapter008

8-8-99

Physical Security Process

Identify the items to be protected Three classes of items requiring assurance:

Equipment – includes tangible things such as hardware and network connections

People – involves human resources and is part of the personnel security process

Environment – includes hazards associated with the environment as well as the safety requirements of the physical space

Page 10: Chapter008

8-8-1010

Physical Security Plan

Should be developed once an understanding of the threat environment has been developedEstablishes a response to events that represent

potential harm and that have a reasonable probability of occurrence

Responds to a threat by recommending the deployment of a set of countermeasures

Effective planning for all contingencies ensures efficient disaster recovery

Page 11: Chapter008

8-8-1111

Physical Security Plan Ensuring effective planning

Implemented through a formal, organization-wide plan aligned with both business and information assurance goals

Should specify the threats associated with the protected items in the secure space and specify countermeasures

Should be able to respond to all credible threats in advance

Establish controls to ensure that the secure space is not susceptible to intrusion and that sensitive materials are stored in secure containers

Should ensure that the organization responds effectively to natural disasters

Implementation plan is overseen by the audit function that monitors and enforces accountability

Page 12: Chapter008

8-8-1212

Physical Security Plan

Defense in-depth countermeasuresBuilt around measures to extend the time it takes

for a threat to cause harmInvolves design of the steps to detect, assess,

and report probable physical threats or intrusions In the threat assessment process, a decision has

to be made about the probabilities of occurrence and harm

• The outcome of that assessment should produce a manageable set of threats, which are likely to occur for that particular space

Page 13: Chapter008

8-8-1313

Physical Security Targets and Threats

It is important to factor four threat types into a comprehensive physical security plan:FacilitiesEquipmentPeopleEnvironment

Page 14: Chapter008

8-8-1414

Threats to the Facility Ensuring clean and steady power

Power problems affect computers in three ways: • Damage the hardware, causing downtime • Affect network availability – lost productivity • Result in a loss of data

Potential infrastructure hazards to look for are:• Voltage swings• Drains• Hazardous wiring

Eliminating fluctuations• Surge suppressors, Uninterruptible Power Supplies

Ensure that access to physical controls is enforced

Page 15: Chapter008

8-8-1515

Threats to the Facility

Ensuring other building systemsEnsure that other critical building systems are

reliable such as:• Heating• Ventilation• Air conditioning • Plumbing• Water supply systems

Page 16: Chapter008

8-8-1616

Safeguarding Equipment

Physical security process safeguards tangible items, they include:Communication, processing, storage, and input

or output devices Countermeasures assure safety and security Conventional physical access control measures

establish the integrity of controlled spacesMeasures include locks, passcards, RFID,

swipecard readers, video cameras, and safesMay also include human-based monitoring and

control methods

Page 17: Chapter008

8-8-1717

Safeguarding Equipment

Protecting networks: ensuring integrity over a wide areaPrevent unauthorized access

• Technical countermeasures for security include:• Interruption sensors• Line monitors• Emanations security

Security failures on networks:• Unauthorized users intercept information by physically

accessing network equipment• If the network is unable to carry out its transmission

functions

Page 18: Chapter008

8-8-1818

Safeguarding Equipment

Protecting portable devices Problem of ubiquitous portability requires

adherence to the following principles:• Ensure that the device itself is always controlled

• Assign individual responsibility and enforce accountability for all portable devices

• Ensure that the data on the device is secure• Ensure that sensitive data cannot be transported nor

displayed without authorization and accountability

• Ensure controls that are provided to ensure security of a portable item are easy for end-users to follow

Page 19: Chapter008

8-8-1919

Controlling Access by People

Effective access control requires:Designing a layered defense in the physical

environmentContinuous monitoring and access control built in

Heart of access control systems is the ability to:Grant convenient physical access to authorized

peopleCompletely deny access to unauthorized ones

Page 20: Chapter008

8-8-2020

Controlling Access by People

Mechanisms for restricting physical access include:Perimeter controls

Controls include restriction devices such as:Natural barriersFence systemsWallsSupplemented with mechanical barriers

• Secure windows, doors, and locks

Page 21: Chapter008

8-8-2121

Controlling Access by People

Perimeter controls: barriersNatural barriers Structural barriers

• Fences define the secure areas and enforce entry only at designated points

• Gates and bollards are part of the restriction system• Closed circuit television (CCTV) • Monitors which provide three levels of control:

• Detection – detects the presence of an object• Recognition – determines the type of object• Identification – determines the object details

Page 22: Chapter008

8-8-2222

Controlling Access by People

Perimeter controls: intrusion detectionEnsures the integrity of a physical spaceMonitors suspicious traffic, tracks intruders, and

subsequently marks security holes discoveredBased on monitoring sensors and observing

actions along the perimeterRetrospective monitoring uses security logs or

audit data to detect unauthorized accessesSensors installed at each access point establish

perimeter protection

Page 23: Chapter008

8-8-2323

Controlling Access by People

Perimeter controls: guards and patrolsLow-tech, labor-intensive approach to access

control• Provide an effective deterrent to unauthorized entry• Less expensive and no less reliable than automated

systems• Not passive and cannot be disconnected or sabotaged

as with high-tech solutions• They are subject to error

Page 24: Chapter008

8-8-2424

Controlling Access by People

Perimeter controls: structural and mechanical barriersDoors and windows have to be strictly controlled

since they are the most likely point of access Considerations in determining which type of

structure to be used:• Whether to employ a hollow-core versus solid-core

technology• How to identify and address hinge and doorframe

vulnerabilities• Whether to monitor use through contact devices such

as switches and pressure plates

Page 25: Chapter008

8-8-2525

Controlling Access by People Mechanical barrier devices: locks

Most widely accepted and employed barrier device

Types of locks include:• Cipher locks• Combination locks• Deadbolt locks• Smart locks

Keys are the authentication tokens for locks:• Security element rests with the control of keys• Most effective when used in a two-factor

authentication system• Example: with a door PIN

Page 26: Chapter008

8-8-2626

Controlling Access by People

Biometric systemsAn emerging authentication tool in physical

access controlBased on exclusive physical attributes, which

can be read and digitizedCan be used in conjunction with smart cardsProblem: scanning errors occur leading to false

positives and false negatives

Page 27: Chapter008

8-8-2727

Controlling Access by People

Doubling the assurance: multiple factor authenticationUses of more than one form of authentication to

control access; based on three broad categories:• What you are (for example, biometrics)• What you have (for example, tokens)• What you know (for example, passwords)

Simple multiple-factor authentication requires confirmation of at least two factors

Three-factor authentication combines three types

Page 28: Chapter008

8-8-2828

Controlling Access by People

Ensuring against the well-intentioned human beingAccidents and non-intentional acts are the most

frequent cause of human-based harm• Proactive way to address human error is through

training and drills• Keeps people continuously aware of their security

responsibilities• It has to be continuous to be effective

• Basic rule of thumb is a corollary to Murphy’s Law: • A disaster plan is an appropriate countermeasure

Page 29: Chapter008

8-8-2929

Mitigating the Effects of Natural Disasters and Fires

Response or disaster planning is the primary means of assuring against the broad category of natural disasters

Disaster response countermeasures center on:AwarenessAnticipationPreparation

Page 30: Chapter008

8-8-3030

Mitigating the Effects of Natural Disasters and Fires

Planning for fire preventionComputers and their components are extremely

flammable devicesThree primary issues associated with fire

protection:• Prevention – reduction in the causes and sources• Detection – receiving a warning of fire• Suppression – extinguishing and containing a fire

Page 31: Chapter008

8-8-3131

Mitigating the Effects of Natural Disasters and Fires

Preventing firesGood building design improves the chances of

prevention• The use of fire-resistant materials in walls, doors, and

furnishings

Reduce the number of combustible materials in the surrounding environment

Proactive approach to fire protection is fire-prevention awareness for employees

• Response drills such as a fire drill

Page 32: Chapter008

8-8-3232

Mitigating the Effects of Natural Disasters and Fires

Fire detectionProvides warning as close to the fire event as

possible• Most common are the ionization-type smoke

detectors, which detect charged particles in smoke

Page 33: Chapter008

8-8-3333

Mitigating the Effects of Natural Disasters and Fires

Fire detection (cont’d)Some kinds of non-equipment-related fires do

not produce smokeTwo related types of detectors are:

• Photoelectric or optical detectors – react to light blockage caused by smoke particles

• Heat sensing – react to the heat of a fire

Downside in both methods – the fire has to be advanced enough to detect

Page 34: Chapter008

8-8-3434

Mitigating the Effects of Natural Disasters and Fires

Fire suppressionThe first line of defense is the fire suppression

systemHaving the right type of fire extinguisher

• Know that fire extinguishers have limited use• Halon is effective and it was the fire suppression agent

of choice • FM200 (FM-200/heptafluoropropane)

• Extinguishes a fire by both robbing it of oxygen and by its physical suppression effect

• Water sprinkler system