19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 6: Physical Security<br />

✓ Do door hinges on the outside make it easy for intruders to unhook them?<br />

✓ Are doors, windows, and other entry points wired to an alarm system?<br />

✓ Are there drop ceilings with tiles that can be pushed up? Are the walls<br />

slab-to-slab? If not, someone could easily scale walls, bypassing any<br />

door or window access controls.<br />

Countermeasures<br />

Many physical security countermeasures for building vulnerabilities might<br />

require other maintenance, construction, or operations experts. If building<br />

infrastructure is not your forte, you can hire outside experts during the<br />

design, assessment, and retrofitting stages to ensure that you have adequate<br />

controls. Here are some of the best ways to solidify building security:<br />

✓ Strong doors and locks<br />

✓ Windowless walls around data centers<br />

✓ A continuously monitored alarm system with network-based cameras<br />

located at all access points<br />

✓ Lighting (especially around entry and exit points)<br />

✓ Mantraps and sallyports that allow only one person at a time to pass<br />

through a door<br />

✓ Fences (with barbed wire or razor wire)<br />

Utilities<br />

You must consider building and data center utilities, such as power, water,<br />

generators, and fire suppression, when assessing physical security. These<br />

utilities can help fight off such incidents as fire and keep other access controls<br />

running during a power loss. They can also be used against you if an<br />

intruder enters the building.<br />

Attack points<br />

Intruders often exploit utility-related vulnerabilities. Consider the following<br />

attack points, which are commonly overlooked:<br />

✓ Is power-protection equipment (surge protectors, UPSs, and generators)<br />

in place? How easily accessible are the on/off switches on these devices?<br />

Can an intruder walk in and flip a switch? Can an intruder simply scale a<br />

wood fence or cut off a simple lock and access critical equipment?<br />

✓ When the power fails, what happens to physical security mechanisms?<br />

Do they fail open, allowing anyone through, or fail closed, keeping everyone<br />

in or out until the power is restored?<br />

85

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!