Module 5: Designing Physical Security for Network Resources
Overview Creating a Plan for Physical Security Designing Physical Security for Network Resources
Lesson 1: Creating a Plan for Physical Security MSF and Physical Security Network Resources That Require Physical Security Defense in Depth and Physical Security STRIDE Threat Model and Physical Security Activity: Analyzing Risks to Physical Security
MSF and Physical Security The MSF envisioning and planning phases help you to: Decide which locations your plan will help to protect Ensure that appropriate countermeasures are applied Identify and achieve the goals of physical security: Deter Detect Delay Respond 3 4 5 Plan Envision
Network Resources That Require Physical Security Desktops Servers Portable Computers Include physical security for network resources Routers/hubs/switches Wireless media Physical media
Defense in Depth and Physical Security Policies, Procedures, and Awareness Physical Security Perimeter Internal Network Host Application Data
STRIDE Threat Model and Physical Security Attackers pretending to be someone else Spoofing Attackers breaking or picking locks Tampering Attackers denying that they are breaking in Repudiation Attackers shoulder surfing Information disclosure Attackers damaging entry systems Denial of service Attackers configuring entry systems to provide more access than they are allowed Elevation of privilege
Activity: Analyzing Risks to Physical Security In this practice you will: Read the scenario Answer the questions Discuss with the class
Lesson 2: Creating a Design for Physical Security of Network Resources Methods for Securing Facilities Methods for Securing Access to Computers Methods for Physically Securing Portable Computers and Mobile Devices Considerations for Disaster Recovery Activity: Physical Threats and Countermeasures
Methods for Securing Facilities To Secure Consider Entrances and exits Hiring security guards Requiring identification badges Installing video surveillance Installing fences and parking lot gates Permitting entry and exit only from main gates Information in buildings Securing data cables from wiretapping Positioning monitors and keyboards away from windows Erasing whiteboards in meeting rooms
Methods for Securing Access to Computers To Secure Consider Access to computers Regulating the removal of computers Regulating the movement of computers Removing externally accessible drives such as floppy disks and DVDs Disabling USB ports Installing device locks Access to computers in sensitive areas Controlling entry points to server rooms Restricting LAN access from lobbies and reception areas
Methods for Physically Securing Portable Computers and Mobile Devices To protect your mobile devices: Educate users about potential threats Require the use of hardware locks and alarms Require the use of biometric logon devices Avoid storage of sensitive data
Considerations for Disaster Recovery To protect your data: Store backup media offsite Maintain cold spares and facilities Maintain hot spares and facilities
Activity: Physical Threats and Countermeasures In this practice you will: Read each scenario Choose the best risk management strategy Determine an appropriate security response Discuss with the class
Lab: Designing Physical Security for Network Resources Exercise 1 Identifying Potential Physical Vulnerabilities Exercise 2 Implementing Countermeasures