7.14/7.15 Implement and manage physical security/Addressing personnel safety and security concerns Flashcards
Domain 7 (12 cards)
are your outermost layer, focused on discouraging and impeding
unauthorized entry into your premises
Perimeter security controls
also called a heat-based motion detector, which works by watching for important changes in temperature in the area it’s
monitoring. It detects movement by sensing when the heat levels in the room change
in a noticeable way.
passive infrared (PIR) motion detector
operate through physical mechanisms where a key or other physical tool
interacts with the lock’s internal components to engage or disengage the locking mechanism.
Mechanical locks
use electronic means to control access, often integrating with broader
security systems or offering features like remote access or audit trails
Electronic locks
Discourage potential attackers or those considering violating policies.
Examples:
* Warning signs (“Area under video surveillance”)
* Fences, barricades, or other physical barriers
* Security guards
* Threat of disciplinary action in security policies
Deterrent
Guide users towards secure behaviors and establish clear boundaries for the use of
systems and facilities.
Examples:
* Security policies (acceptable use, password policy, etc.)
* “Clean Desk” policies
* Access control lists (ACLs) limiting who can reach various network segments
* Technical restrictions (disabling unnecessary ports, software installations)
Directive
Identify security incidents in progress or those that have already occurred.
Examples:
* Intrusion detection systems (IDS)
* Security cameras
* Log monitoring and audit trails
* Honeypots or honeyfiles (deceptive “traps” to lure attackers)
Detective
React to and mitigate the impact of a security incident, aiming to bring things back
to a secure state.
Examples:
* Antivirus / Anti-malware reacting to an infection
* Disabling compromised user accounts
* Automated patching in response to a vulnerability disclosure
* Incident response team taking action to contain a breach
Corrective
Restore data, systems, or operations following an incident.
Examples:
* Backups and the processes for restoring data
* Failover systems taking over from failed equipment
* Disaster recovery plans outlining steps to resume operations
* Incident response plans (which often overlap with recovery efforts)
Recovery
Provide alternative safeguards when primary security controls cannot be fully
implemented or aren’t feasible.
Examples:
* Increased monitoring where full access control isn’t practical
* Segregation of duties to prevent fraud if a single person can’t perform a
complete critical task
* Encryption protecting sensitive data in case physical controls are weak
Compensating
involves planning and strategies to ensure personnel safety and
security post-disaster. Disasters can be natural (e.g., hurricanes, earthquakes) or humancaused
(e.g., fires, terrorist attacks, cyberattacks). Plans vary by the likely types of disasters
in an area, always prioritizing personnel safety
Emergency management
refers to a situation where an employee is forced to perform an action or
set of actions that they would not do under normal circumstances due to external pressure or
threats.
Employee duress