90 likes | 206 Vues
As a system administrator, understanding the importance of physical security is crucial for safeguarding data and assets. This guide covers key concepts, including attack vectors—both electronic and physical—highlighting the necessity for a layered security approach. Explore the significance of facility design, access control, and personnel training to mitigate risks. Learn strategies for securing server rooms and data centers, ensuring robust defenses against unauthorized access. Elevate your security posture by adopting comprehensive measures against both social and physical threats.
E N D
Physical Security For System Administrators John Mark Smotherman
Overview • Think Using Attack Vectors • Electronic Security - attacks from the network • Physical Security - attacks on the physical machine or environment • Electronic security means nothing if they can touch the machine! • Design • Hardened Core • Personnel • Social Attacks
Importance • Why should a future sysadmin care about physical security? • That’s Security’s Job! • Overlap • System Administration/Facilities • Server security/server room security • Input into server room design • Responsibility for security camera feeds • High Security Jobs • Military, Data Warehousing for Companies
Hardened Core • Physical Defense-in-Depth • Multiple checkpoints • Data Centers should be like Ogres • Sectioning and Layering by access • Sole Purpose Rooms • Access Control • Server Room Design • Secure HVAC • No windows • What happens during an emergency, e.g. a fire?
Access • Two- and Three-Factor Security • Something You Have • Something You Are • Something You Know • Electronic Access (Databases) • Separation of Authentication • Requires Multiple Attack Vectors to Break • Differing Keys • Differing Servers
Personnel • Breaches waiting to happen • Tailgating • Cleaning Personnel • Facilities (e.g. HVAC) • Malicious Attacks • How to deal with this? • Training! • Mantrap/Turnstyle • Guards, Escorts
Case In Point • Data Warehouse • Server farm machines or space • Rented out to various companies • Secure Design • What happens when the IBM rep wants access to his machines, and they’re next to the Intel ones? • Intel = • Importance of Hardened Core and Sole Purpose
The Take-Away • Physical Security Matters! • Hardened Core/Defense In Depth • Casing the Joint • Think like a criminal • Social Attack Vectors Matter Just as Much as Physical and Electronic Ones
Etc. • Van Eck Phreaking • Reading your screen through the wall • Trash • Secure, monitored disposal • Job Descriptions • Don’t let an attack vector go unprotected because you can’t agree who has to do it!