2.7 Physical Security Controls

Physical Security Controls

Barricades/bollards = prevent access Alarms = motion detection, circuit based Signs = clear and specific instructions to keep people away from restricted areas

Video surveillance = CCTV (closed circuit television), motion/object recognition Industrial camouflage = conceal an important facility in plain sight, blends in to the local environment Faraday cage = blocks electromagnetic fields, mesh of conductive material, can restrict access to mobile networks

Screened subnet (DMZ) = additional layer of security between internet and you Protected distribution system (PDS) = physically secure cabled network, all of the data flows through these conduits


Secure Areas

Important part of a security policy is to prevent physical access to critical systems to secure data.

Air gap = network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks - physical separation between networks - e.g. stock market network | airplanes | nuclear power plant operations | power systems/SCADA


Secure Data Destruction

Data destruction and media sanitization = some information must not be destroyed - you don't want critical information in the trash - ensure nothing is left behind - shred your documents - pulverizing = destroying hard disks, no way to recover

Purge data = remove it from an existing data store, delete some of them Wipe data = unrecoverable removal of data on a storage device

Last updated

Was this helpful?