NIST Cybersecurity Framework

 

 

Physical Vulnerability assessment of security perimeters of TechWorx.
Mr. Scott wants a Physical vulnerability assessment of the security perimeters of TechWorx.

 

Inside the Techworx building:
1st-floor reception and access to stairs, elevators, loading dock, and restrooms
2d floor offices and conference rooms
3rd floor: Executive offices
4th floor: IT Offices and data center
Define the three Perimeters (Outer, Inner, and Interior) for TechWorx and what are the key vulnerabilities of each of the perimeters. Note: In figure 2 below, there is no indication of an outer perimeter. You will need to create one for the organization.
What are the most critical areas/limited access areas that we should secure in the building?
Include at least one supporting figure, image, or diagram. (you may have more than one)
Ensure you address all three security perimeters.
What type of access control systems do you recommend for TechWorx and why? Note: I am not asking for a specific model and brand. At this point, we are just brainstorming what types of systems we will need.
Mr. Scott was very happy to hear about the NIST Cybersecurity Framework. He is anxious to get started on protecting TechWorx equipment and personnel.

Sample Solution

Outer Perimeter

The outer perimeter of TechWorx is the outermost layer of security for the organization. It includes the perimeter fencing, gates, and parking lot. The key vulnerabilities of the outer perimeter include:

  • The fencing is not very high, and it is possible for someone to climb over it.
  • The gates are not always locked, and it is possible for someone to enter the property without being authorized.
  • The parking lot is not well-lit, and it is possible for someone to break into a car or commit other crimes.

Inner Perimeter

The inner perimeter of TechWorx is the area inside the outer perimeter. It includes the main entrance, the lobby, and the stairs and elevators. The key vulnerabilities of the inner perimeter include:

  • The main entrance is not always staffed, and it is possible for someone to enter the building without being authorized.
  • The lobby is not well-lit, and it is possible for someone to hide or ambush someone.
  • The stairs and elevators are not always monitored, and it is possible for someone to access restricted areas without being authorized.

Interior Perimeter

The interior perimeter of TechWorx is the area inside the inner perimeter. It includes the offices, conference rooms, and the data center. The key vulnerabilities of the interior perimeter include:

  • The offices are not always locked, and it is possible for someone to enter an office without being authorized.
  • The conference rooms are not always locked, and it is possible for someone to eavesdrop on a meeting.
  • The data center is not well-protected, and it is possible for someone to steal sensitive data.

Critical Areas

The most critical areas in TechWorx are the following:

  • The main entrance
  • The lobby
  • The stairs and elevators
  • The offices of executives and other high-level employees
  • The conference rooms
  • The data center

These areas are critical because they contain sensitive information or equipment. It is important to secure these areas to prevent unauthorized access.

Recommendations

I recommend the following security measures to improve the security of TechWorx:

  • Increase the height of the fencing and install barbed wire along the top.
  • Lock the gates at all times and install security cameras at the gates.
  • Improve the lighting in the parking lot and install security cameras in the parking lot.
  • Staff the main entrance 24/7 and install security cameras at the main entrance.
  • Improve the lighting in the lobby and install security cameras in the lobby.
  • Monitor the stairs and elevators with security cameras.
  • Lock the offices and conference rooms when they are not in use.
  • Install security cameras in the offices and conference rooms.
  • Secure the data center with a physical security system and a network security system.

These security measures will help to protect TechWorx from unauthorized access and prevent theft, vandalism, and other crimes.

Figure 1: Outer Perimeter of TechWorx

Figure 2: Inner Perimeter of TechWorx

Figure 3: Interior Perimeter of TechWorx

Type of Access Control Systems

I recommend a combination of access control systems for TechWox, including:

  • A physical access control system to control access to the building and to restricted areas inside the building.
  • A network security system to control access to the organization’s network and to sensitive data.
  • A video surveillance system to monitor the building and to identify unauthorized activity.

These access control systems will help to prevent unauthorized access to TechWorx and to protect sensitive information.

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.