Physical Security MindMap
To Download the FREE PDF of MindMaps
Your information will remain 100% private. Unsubscribe with 1 click.
Transcript
Introduction
Hey, I’m Rob Witcher, and I’m here to help YOU pass the CISSP exam. We are going to go through a review of the major malware, and anti-malware topics in Domain 7, to understand how they interrelate, and to guide your studies and help you pass the CISSP exam.
This is the third of six videos for domain 7. I have included links to the other MindMap videos in the description below.
Physical Security
Physical security is critical in achieving confidentiality, integrity and availability.
There is an expression I like: if you can touch the box, you own the box.
In other words, if an attacker can gain physical access to a device like a firewall or a server they can easily gain control of the device. This is because our equipment has all sorts of bypass controls built in, like factory reset buttons.
We need to carefully control who can gain access to our facilities, specific rooms, and certain equipment.
Physical security is also critical in achieving integrity and availability as physical security controls like UPSs & generators provide a good clean supply of power / electricity,
HVAC systems provide cooling air at the right temperature and humidity
and fire detection and suppression systems help to ensure our facilities don’t burn to the ground.
All very important things in achieving confidentiality, integrity and availability
Safety of people
There is one overarching / primary goal of physical security, and that is… safety of people. People are the most valuable, the most important asset of any organization and physical security controls must prioritize the safety of people above all else.
Categories of Controls
There are five categories of controls used in physical security
Deter Delay Detect Assess Respond
Deter, delay, detect, assess and respond.
- Deterrent Controls discourage things like trespassing, property damage, theft and intrusion through signage and the environmental design of a building and the land around it
- Delay Controls delay a risk from occurring, for example locks delay an attacker from gaining unauthorized access
- Detective Controls detect if a risk has occurred. CCTV cameras are a perfect example of a detective control
- Assess Controls are used to determine the method of attack and the target
- And finally, Respond Controls take appropriate actions to remediate the risk
Layered Defense
When we are implementing the aforementioned controls, we never want to implement a control in isolation. If there is only one control protecting an asset and that control fails then… bad stuff will happen.
This is why we want to have multiple layers of controls, and at each layer have a combination of preventive, detective and corrective controls or in physical security terms deterrent, detective and assess & respond controls. The is the concept of defense in depth
Perimeter
The first layer of defense protecting a facility is often an outside perimeter like a fence. Another perimeter will be the exterior walls of the building.
What is the best way to secure the perimeter? Minimize the number of entrances and exits, the number of doors.
Landscape
Landscaping refers to the foliage around a building, the trees and plants. You want to ensure the foliage is maintained to provide clear sight lines for cameras and that a would be attacker can’t just climb up a tree and into the building.
Grading
Grading refers to how the land is sloped around a building. You want the ground to slope down and away from the building so that in the event of a flood your nice and dry on an island and not at the bottom of a lake.
Cameras
CCTV - Closed Circuit Television – Camera systems are an important part of physical security as a deterrent, detective control, and can also be used for monitoring and auditing. Cameras are primarily detective controls.
Passive Infrared Devices
Passive Infrared Devices are motion sensors. They are essentially really low-resolution cameras that detect infrared light – the heat that is emitted by objects in its field of view. If you as a homeothermic mammal walk into a room then the amount of infrared light in the room is going to increase and thus your movement will be detected.
These devices must automatically recalibrate themselves if the ambient air temperature changes.
Lighting
Lighting is an important physical security control. A well-lit building helps deter crime and good lightning is important for the safety of people.
Card Readers / Badges
Card readers are electronic systems used to control who is authorized to pass through a door into the building or into different rooms within the building. There are two major types of card reader systems. Contact & Contactless. In contact systems an employee must swipe their card through the reader for older magnetic readers. In newer contactless systems an employees only needs to hold their card near the RFID (Radio Frequency ID) systems.
Badges are simply an employee name and photo on a card.
Doors / Mantraps
Doors are the primary way that we control who can gain access to a building and specific parts of the building.
A social engineering attack on doors is tailgating or piggybacking – an intruder follows an authorized person through a door after they have unlocked it. This is a super common and successful attack that can be prevented by using specialized doors: mantraps or turnstiles.
Mantraps are two doors, one after another. You must unlock the first door, enter a small space, close the first door behind you and only then can you unlock the second door. Mantraps prevent someone from tailgating or piggybacking.
Locks
Locks are a perfect example of a DELAY control in physical security. It is just a matter of time before an attacker picks, forces, or breaks a lock and gains entry – checkout the lock picking lawyer if you don’t believe me. Because locks are DELAY controls they should never be implemented in isolation. Remember layered security or defense in depth.
There are loads of different types of locks out there.
Mechanical
A couple of broad categories are mechanical locks - for example keyed locks, mechanical combination locks, and magnetic locks
Digital
And a second broad category are electronic locks - proximity or RFID locks., electronic combination locks, and biometric locks.
One of the most important factors that determines the security of combination locks is the complexity of the combination.
Windows
We love the natural light that streams in through windows but windows are often the weak link in the perimeter of a building. There are various type of glass that a window can be made out of (plate, tempered, laminated, wired & polycarbonate to name a few) but I don’t suggest you memorize the different types of glass.
Instead understand a couple of types of sensors that can be used to detect if the glass in a window has been broken
Shock
Shock sensors are attached directly to a pain of glass and they are designed to detect the small shockwave that is generated when a window breaks.
Glass break
Glass break sensors on the other hand are essentially microphones that are constantly listening for the specific frequencies of sound that are generated when glass breaks.
Which would be better in a loud occupied room? Shock sensors.
Walls
Walls are also obviously rather critical to physical security. It is tough to secure a building that doesn’t have exterior and interior walls.
Skimming
I’ve thrown skimming in here for lack of a better place to put it. Skimming is where crooks use an electronic device to steal card information from a valid transaction. So, for instance, install a little electronic device on a bank machine which records your debit card number or on a Point of Sale machine to skim your credit card details when you pay for something or an attacker stands near a secure door and wirelessly records the RFID communications from your employee card.
Infrastructure
Lets now talk about the three major infrastructure services that are critical to the operation of a facility: Network, Power, and HVAC
Network
Network – a reliable connection to the largest distributed network in the world – the internet and/or to other locations of the organization.
Power
It’s tough to find equipment nowadays that doesn’t require electricity and harder yet to imagine a business that could continue to function without electronic systems of some sort. Accordingly, security is very concerned with providing a consistent supply of clean power.
And by clean power I don’t mean from renewable sources like wind or solar – which is an awesome source of power
But rather, by clean power, I mean Alternating Current (AC) power that oscillates at a perfect 60 Hz with no noise or distortion in the line – it’s a perfect sine wave.
UPS
A couple of important devices used to provide a consistent supply of clean power. UPS & Generators.
UPS – Uninterruptable Power Supplies, are basically giant batteries that provide instantaneous but short term power. Until…
Generator
The generator has time to start up and come online. Generators are typically large diesel engines connected to an alternator and generators can provide long-term backup power – for hours or even days depending on how much fuel is onsite.
Power Outages
There are various types of power outages that physical security is concerned with: A Blackout is no power for a long period of time. And Faults are a momentary loss of power.
Power Degradation
Power degradation means there is too little or too much power. Brownouts are an intentional reduction of voltage by the utility company. Sags & Dips are a short period of low voltage.
And Surges are a momentary spike of too much voltage. Think lightning strike.
HVAC
HVAC stands for Heating Ventilation and Air Conditioning. These are the systems that provide air to a building at the correct temperature & humidity and filter the air.
Temperature
The primary reason for bringing cool air into a data center is to cool the equipment and ensure the equipment is operating within a desired temperature range. Thankfully for the CISSP exam, you don’t need to memorize the optimal temperature ranges.
Humidity
HVAC systems will also provide air at the right humidity. Too dry and you get static electricity, too humid and you get condensation. Both are bad. And again, you don’t need to memorize the optimal ranges
Air Quality
The final major function of HVAC systems is to filter the air to remove dust and other contaminants. In a datacenter the air is being sucked into and through servers and other equipment and if there were contaminants in the air they could clog up the equipment causing shorts or for the equipment it to overheat and fail.
Related to air quality, you should know a term: positive pressurization. The idea is that this nice clean filtered air will be blown into the datacenter at slightly above ambient pressure, thus positively pressurizing the datacenter. Why would we want to do this? If there are any cracks in the walls, or someone opens a door, then nice clean air is being forced out preventing any dirty air and contaminants from infiltrating.
Fire Detection
Ok, now for a favourite topic of mine. Fire!
Fire is a significant risk. And like any other risk we need to put controls in place to mitigate the risk of fire. Whenever we implement controls, we want a combination of preventative, detective and corrective controls.
What’s the best way to prevent a fire? Limit or eliminate any combustible materials
You can never entirely prevent the risk of fire though, so if a fire does occur you want to detect it as quickly as possible – so we’ll talk about different fire detection methods.
And as soon as you have detected a fire you want to correct it as quicky as possible, so we’ll finish this MindMap by talking about different fire suppression systems.
Alright fire detection systems. There are three major types: flame detectors, smoke detectors and heat detectors
Flame (Infrared)
Flame detectors detect the Infrared and Ultraviolet light created by flames. Flame detectors are essentially video cameras that you point at something you are concerned might start on fire.
Smoke
There’s always some before a fire, and one of the best ways of detecting a fire as early as possible is using a smoke detector. There are two major types of smoke detectors, ionization and photo-electric
Ionization
Ionization detectors respond more quickly to what are known as flaming or fast fires
Photo-electric
Whereas Photo-electric, often referred to as optical detectors respond more quickly to smoldering fires
Dual
Most good quality detectors these days are known as dual detectors; they combine ionization and photo-electric detectors into one device.
Heat (Thermal)
And finally heat detectors, often referred to a thermal detectors, are essentially temperature sensors that are monitoring for a rapid rise in temperature. If the temperature rapidly spikes you probably have a fire.
Which of these systems will detect a fire as early as possible? Remember there is always smoke before a fire, and the type of fire we are most concerned with is flaming or fast fires. So, pick ionization detectors.
Fire Suppression
Lets now talk about how we suppress a fire. There are two major types of systems: water-based, and gas-based.
Water-based systems are cheaper than gas-based systems, but water and expensive electrical equipment in a datacenter is a terrible combination.
So, gas-based fire suppression systems are cost justified in data centers.
Water
Water based systems are common in office buildings, hotels, and other spaces where some water is not going to destroy millions of dollars worth of equipment. There are four types of water-based systems you should know about.
Wet Dry Pre-action Deluge
Wet-pipe systems always have pressurized water in the pipes, just waiting to be released. Wet-pipe systems are the cheapest but have significant downsides: you can’t use them where the pipes might freeze, and because there is pressurized water in the pipes at all times you are inevitably going to get leaks
Dry-pipe systems look identical to wet-pipe but the key difference is the pipes are dry. They are filled with a pressurized gas, and water only comes flooding into the dry pipes when needed.
There are also pre-action and deluge systems and both of course use water to put out a fire.
Gas
Gas based systems use various types of gas to put out the fire. Some gas-based system displace the oxygen from a room. No oxygen equals no fire.
But also, no oxygen equals no human life so it is critical to have safety systems in place to allow people to exit the datacenter before the gas is released.
Another method some gas-based systems will use to suppress a fire is to interrupt the chemical exothermic process that is fire.
INERGEN Argonite FM-200 Aero-K
Here are the 4 major types of gases you need to know about: INERGEN, Argonite, FM-200 and Aero-k.
All of them are gas-based fire suppression agents.
There is one I will highlight: Aero-k. It is supposedly both safe for equipment – it won’t damage the precious servers - and it is apparently safe for people, but I’m not keen to test that on myself.
Extinguisher
The final tool in your fire suppression arsenal is fire extinguishers. These red things you see all over the place.
There are five different classes of fire extinguishers: A, B, C, D and K. Each class is meant to put out a different type of fire and will use different suppression agents.
There is only one class that I will highlight, and that is C. Class C fire extinguishers are designed to put out electrical fires – the type of fire you might have in a datacenter. And Class C extinguishers will often use CO2, good old carbon di-oxide as the suppression agent.
CO2 is an excellent fire suppression agent to use in datacenters, because C02 is non-corrosive (it won’t damage the expensive equipment), it doesn’t leave a residue, doesn’t conduct electricity, and provided you don’t use too much, it’s safe for humans.
Overview
And that is an overview of physical security within Domain 3, covering the most critical concepts to know for the exam.
If you found this video helpful you can hit the thumbs up button and if you want to be notified when we release additional videos in this MindMap series, then please subscribe and hit the bell icon to get notifications.
I will provide links to the other MindMap videos in the description below.
Thanks very much for watching! And all the best in your studies!