NIST Cybersecurity Framework
Physical Vulnerability assessment of security perimeters of TechWorx.
Mr. Scott wants a Physical vulnerability assessment of the security perimeters of TechWorx.
Inside the Techworx building:
1st-floor reception and access to stairs, elevators, loading dock, and restrooms
2d floor offices and conference rooms
3rd floor: Executive offices
4th floor: IT Offices and data center
Define the three Perimeters (Outer, Inner, and Interior) for TechWorx and what are the key vulnerabilities of each of the perimeters. Note: In figure 2 below, there is no indication of an outer perimeter. You will need to create one for the organization.
What are the most critical areas/limited access areas that we should secure in the building?
Include at least one supporting figure, image, or diagram. (you may have more than one)
Ensure you address all three security perimeters.
What type of access control systems do you recommend for TechWorx and why? Note: I am not asking for a specific model and brand. At this point, we are just brainstorming what types of systems we will need.
Mr. Scott was very happy to hear about the NIST Cybersecurity Framework. He is anxious to get started on protecting TechWorx equipment and personnel.
Sample Solution
Outer Perimeter
The outer perimeter of TechWorx is the outermost layer of security for the organization. It includes the perimeter fencing, gates, and parking lot. The key vulnerabilities of the outer perimeter include:
Figure 2: Inner Perimeter of TechWorx
Figure 3: Interior Perimeter of TechWorx
Type of Access Control Systems
I recommend a combination of access control systems for TechWox, including:
- The fencing is not very high, and it is possible for someone to climb over it.
- The gates are not always locked, and it is possible for someone to enter the property without being authorized.
- The parking lot is not well-lit, and it is possible for someone to break into a car or commit other crimes.
- The main entrance is not always staffed, and it is possible for someone to enter the building without being authorized.
- The lobby is not well-lit, and it is possible for someone to hide or ambush someone.
- The stairs and elevators are not always monitored, and it is possible for someone to access restricted areas without being authorized.
- The offices are not always locked, and it is possible for someone to enter an office without being authorized.
- The conference rooms are not always locked, and it is possible for someone to eavesdrop on a meeting.
- The data center is not well-protected, and it is possible for someone to steal sensitive data.
- The main entrance
- The lobby
- The stairs and elevators
- The offices of executives and other high-level employees
- The conference rooms
- The data center
- Increase the height of the fencing and install barbed wire along the top.
- Lock the gates at all times and install security cameras at the gates.
- Improve the lighting in the parking lot and install security cameras in the parking lot.
- Staff the main entrance 24/7 and install security cameras at the main entrance.
- Improve the lighting in the lobby and install security cameras in the lobby.
- Monitor the stairs and elevators with security cameras.
- Lock the offices and conference rooms when they are not in use.
- Install security cameras in the offices and conference rooms.
- Secure the data center with a physical security system and a network security system.
- A physical access control system to control access to the building and to restricted areas inside the building.
- A network security system to control access to the organization's network and to sensitive data.
- A video surveillance system to monitor the building and to identify unauthorized activity.