Page 624 - StudyBook.pdf
P. 624

608    Chapter 11 • Operational and Organizational Security: Incident Response

                 When creating measures to protect systems, it is important to note that threats
             are not limited to people outside the company. One of the greatest challenges to
             physical security is protecting systems from people within an organization.
             Corporate theft is a major problem for businesses, because employees have easy
             access to equipment, data, and other assets. Because an employee’s job may require
             working with computers and other devices, there is also the possibility that equip-
             ment may be damaged accidentally or intentionally. Physical security must not only
             protect equipment and data from outside parties, but also those within a company.
                 A good way to protect servers and critical systems is to place them in a central-
             ized location. Rather than keeping servers in closets throughout a building, it is
             common for organizations to keep servers, network connectivity devices, and crit-
             ical systems in a single room. Equipment that cannot be stored in a centralized
             location should still be kept in secure locations. Servers, secondary routers, switches,
             and other equipment should be stored in cabinets, closets, or rooms that are locked,
             have limited access, are air-conditioned, and have other protective measures in place
             to safeguard equipment.



                Reviewing Physical Security
                Even if the physical security of a location is suitable when a server was
              Head of the Class…  will move to different offices, renovations will be made to facilities, and
                installed, it may not be at a later date. In an office environment, people

                equipment will be moved. Even though a server was initially placed in a
                secure location, the server could be moved or the location could become
                insecure as changes are made.
                     Unfortunately, many of the decision makers in a company may be
                clueless as to the importance of physical security for network equipment,
                and make changes without considering implications. In a large organiza-
                tion where much of the network administration is done remotely, IT staff
                may be unaware that such changes have even occurred. For example, in
                one organization, I saw numerous problems with physical security. During
                construction to a reception area, the server was moved from a closet
                behind the reception desk area to the center of an unlocked room.
                Another server closet became a catchall area, and would be unlocked to
                allow people to put equipment, office supplies, and their coats and boots
                in the winter. When renovations occurred at another location, the server
                was moved to a closet in a washroom area. This would have been bad
                enough, except that it was later designated a public washroom, and
                employees who accessed the closet would occasionally forget to lock it.
                Perhaps even worse, when an architecture firm was hired to evaluate the
                                                                                    Continued

          www.syngress.com
   619   620   621   622   623   624   625   626   627   628   629