18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[Chapter 12] Physical <strong>Sec</strong>urity<br />

as different organizations running the identical system software might have dramatically different<br />

physical-security needs. (Many popular books on <strong>UNIX</strong> system security do not even mention physical<br />

security.) Because physical security must inherently be installed on-site, it cannot be pre-installed by the<br />

operating system vendor, sold by telemarketers, or FTP'ed over the <strong>Internet</strong> as part of a free set of<br />

security tools.<br />

Anything that we can write about physical security must therefore be broadly stated and general. Because<br />

every site is different, this chapter can't give you a set of specific recommendations. It can only give you<br />

a starting point, a list of issues to consider, and a procedure for formulating your plan.<br />

12.1.1 The Physical <strong>Sec</strong>urity Plan<br />

The first step to physically securing your installation is to formulate a written plan addressing your<br />

current physical security needs and your intended future direction - something we discussed in Chapter 2,<br />

Policies and Guidelines. Ideally, such a plan should be part of the site security policy, and should<br />

include:<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

Description of the physical assets that you are protecting<br />

Description of the physical area where the assets are located<br />

Description of your security perimeter (the boundary between the rest of the world and your<br />

secured area), and the holes in the perimeter<br />

Threats you are protecting against<br />

Your security defenses, and ways of improving them<br />

Estimated cost of any improvements, the cost of the information that you are protecting, and the<br />

likelihood of an attack, accident, or disaster<br />

If you are managing a particularly critical installation, you should take great care in formulating this plan.<br />

Have it reviewed by an outside firm that specializes in disaster recovery planning and risk assessment.<br />

You should also consider your security plan a sensitive document: by its very nature, it contains detailed<br />

information on your defenses' weakest points.<br />

Smaller businesses, many educational institutions, and home systems will usually not need anything so<br />

formal; some preparation and common sense is all that is usually necessary, although even a day of a<br />

consultant's time may be money well spent.<br />

Some organizations may consider that many of the ideas described in the following sections are overkill.<br />

Before you come to this conclusion, ask yourself five questions:<br />

1.<br />

2.<br />

3.<br />

Does anybody other than you have physical access to your computer?<br />

What would happen if that person had a breakdown or an angry outburst, and tried to smash your<br />

system with a hammer?<br />

What would happen if someone in the employ of your biggest competitor were to come into the<br />

building unnoticed?<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/ch12_01.htm (2 of 3) [2002-04-12 10:45:43]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!