Page 696 - StudyBook.pdf
P. 696

680    Chapter 12 • Operational and Organizational Security: Policies and Disaster Recovery


                     To be effective, policies must apply to everyone or there is no point
                in having them. Policies and procedures exist to protect personnel, equip-
                ment, data, and other assets of a company, and are generally imple-
                mented for well thought out reasons. If someone fails to adhere to
                policies, then situations can result that have a widespread impact on
                security.

             Physical Security Policies

             Security policies should also address physical security. Physical security is the applica-
             tion of preventative measures, countermeasures, and physical barriers that are
             designed to prevent unauthorized individuals from accessing facilities, areas, or
             assets of a company.These unauthorized individuals can be intruders or employees
             of the business.After all, if a user does not have the ability to perform certain
             actions from their own workstation, a security risk may still exist if they can physi-
             cally sit at a server and modify security settings or delete important data.The solu-
             tion to such intrusions would be that servers and other vital equipment should be
             locked in a secure room (or closet) to prevent unauthorized persons from accessing
             it. Physical security policies outline how to restrict physical access, limiting the
             potential impact of various threats.
                 There are numerous assets and aspects of physical security that must be
             addressed in security policies.These include:

                  ■   Facilities, which focuses on the buildings and properties of an organiza-
                      tion, and outlines access controls used to enter and leave various areas.The
                      policy should also incorporate section security, where specific areas like
                      server rooms, reception areas, labs, and other areas that are restricted or
                      open to the public are addressed.

                  ■   Assets, which focuses on the hardware, software, data, equipment, per-
                      sonnel, and other items of value in an organization.The policy should
                      address issues that could result in tampering, theft, or damage. For
                      example, a courthouse with heightened security may need to limit phys-
                      ical access to front desk personnel, and require a barrier made of bullet-
                      proof/shatterproof glass to be erected.
                  ■   Control measures, which outline how facilities and other assets of the com-
                      pany are secured.Areas that are designated as restricted zones may require
                      locks, biometric authentication, or any number of other control measures.
                      Workstations, servers, and other equipment may also be physically secured,




          www.syngress.com
   691   692   693   694   695   696   697   698   699   700   701