CISSP Exam Notes Physical Security v1.1
CISSP Exam Notes Physical Security v1.1
1. Introduction
1.1 Physical security addresses the physical protection of the resources of an organization,
which include people, data, facilities, equipment, systems, etc. It concerns with people
safety, how people can physically enter an environment and how the environmental
issues affect equipment and systems. People safety always takes precedence over the
other security factors.
1.4 There are three major types of control mechanisms for physical security:
Ÿ Administrative controls, e.g. facility selection, facility construction and
management, personnel control, evacuation procedure, system shutdown procedure,
fire suppression procedure, handling procedures for other exceptions such as
hardware failure, bomb threats, etc.
Ÿ Physical controls, e.g. facility construction material, key and lock, access card and
reader, fence, lighting, etc.
Ÿ Technical controls, e.g. physical access control and monitoring system, intrusion
detection and alarm system, fire detection and suppression system, uninterrupted
power supply, heating / ventilation / air conditioning system (HVAC), disk mirroring,
data backup, etc.
1.5 Some physical security controls are required by laws, e.g. fire exit door, fire alarm, etc.
CISSP Exam Notes - Physical Security 2
2. Facility Requirement
2.3 When designing and building a facility, the following items should be considered:
Ÿ Wall - fire rating (level of fire protection and combustibility), load (the maximum
weight it can hold), floor to ceiling barrier, reinforcement for secured area.
Ÿ Partition – considerations similar to those of wall, plus the requirement of extension
above drop ceiling (if there is no extension, an intruder can lift the ceiling panels and
climb above the partition).
Ÿ Door – fire rating (should be equal to that of the surrounding walls), emergency
marking, directional opening, resistance from being forced open, intrusion detection
alarm, fail-soft vs fail-safe lock (i.e. lock that is unlocked or locked in a power
outage), placement of doors.
Ÿ Window – characteristics of windows material (opaque, translucent, transparent,
shatterproof, bulletproof), intrusion detection alarm, placement of windows.
Ÿ Ceiling – fire rating, load, waterproof (preventing water leakage from the upper
floor), drop ceiling.
Ÿ Floor – fire rating, load, raised floor, electrical grounding (for raised floor), non-
conducting material.
Ÿ Heating, ventilation, and air conditioning (HVAC) – independent power source,
positive air pressure (i.e. air will flow out of a room when the door is open, which
can avoid contamination of the room), protected intake vents to prevent tampering,
monitoring of environmental condition, emergency power off, placement of HVAC
CISSP Exam Notes - Physical Security 3
system.
Ÿ Power supplies – backup power supply, clean power supply, circuit breaker, access
to power distribution panels, placement of power sockets.
Ÿ Liquid and gas line – shutoff valve, positive flow (i.e. liquid or gas should flow out
of a building, not in), leakage sensor, placement of liquid and gas lines.
Ÿ Fire detection and suppression – fire or smoke detector and alarm, sprinkler, gas
discharge system, placement of detectors and sprinkler heads.
Ÿ Emergency lighting – essential power supply and battery for emergency lighting.
2.4 In general, a wall should have 1-hour fireproof rating. For data center or room which
stores paper document, magnetic media, etc., the walls should have a minimum of 2-hour
fireproof rating.
3. Perimeter Security
3.1 Perimeter security controls are used to prevent unauthorized access to a facility. They
deal with access control, auditing and monitoring; intrusion detection and response.
3.2 The perimeter security requirements when a facility is in operation should be different
from those when the facility is closed.
3.4 Lock and key is the most inexpensive physical access control mechanism. It is a
deterrent and delaying device to intruders. There are several types of locks as follows:
Ÿ Preset lock – Typical door lock, which needs to be replaced if the key needs to be
changed.
Ÿ Programmable lock or Cipher lock – Lock with key pad which requires a
combination of keys to open the lock, or lock with reader which requires an access
card to open the lock. It may have special options such as:
Ÿ Hostage alarm (support a key combination to trigger an alarm).
CISSP Exam Notes - Physical Security 4
3.6 Access card and reader can also be used as an access control mechanism (details can be
found in Chapter 5).
3.7 Fence is another physical access control mechanism. Fences of different heights can
serve different purposes:
Ÿ 3 – 4 feet – deter casual trespassers.
Ÿ 6 – 7 feet – deter general intruders.
Ÿ 8 feet with strands of barbed wire (slant at a 45o angle) – deter more determined
intruders.
3.8 Perimeter intrusion and detection assessment system (PIDAS) is a fencing system
with mesh wire and passive cable vibration sensors that can detect if an intruder is
approaching and damaging the fence. However, it may generate many false alarms.
3.9 Bollards are small and round concrete pillars that are constructed and placed around a
building to protect it from being damaged by someone running a vehicle into the side of
the building.
3.10 Lighting (e.g. streetlight, floodlight and searchlight) is a good deterrent for unauthorized
access. It can also provide safety for personnel. The National Institute of Standards
and Technology (NIST) standard requires critical areas to be illuminated 8 feet in height
with 2-foot candle power.
3.12 A man-trap is an area with double doors. There is a security guard or another
mechanism to identify and authenticate an individual before opening the second door.
This control can solve the piggybacking problem of access control (one following
another closely through a door).
3.13 Visitor access to restricted areas requires special security controls such as visitor
registration and escort.
3.14 An audit trail should be maintained for every entrance of a restricted area. It can be
used for auditing whether the access controls are properly enforced, and for incident
investigation after an incident happens. It should contain the following information for
every access attempt:
Ÿ Timestamp of the access attempt.
Ÿ User name.
Ÿ Result of the access attempt (successful or unsuccessful).
Ÿ Departure time of the user.
3.15 For mobile devices, laptops, or similar equipment that cannot be protected by the
perimeter security controls, other security measures (e.g. device lock and data encryption)
and user responsibilities become more important.
3.16 Physical access monitoring controls include patrol force, security guards and dogs.
3.17 Patrol force / security guard is a good deterrent to intrusion and can provide flexible
security and safety response, but it has the following drawbacks:
Ÿ It is expensive.
Ÿ The reliability of security guards is an issue. Pre-employment screening and other
background checking are required.
Ÿ Human is subject to social engineering. Training against social engineering is
required.
3.18 Dogs are very effective in detecting intruders and other exceptions because they have
good sight, hearing and smelling capabilities. Moreover, they are loyal, intelligent, and
can be trained to recognize specific smells, e.g. smoke.
CISSP Exam Notes - Physical Security 6
3.21 Other issues related to intrusion detection and alarm systems are:
Ÿ An intrusion detection system may generate a lot of false alarms.
Ÿ For simplicity, different detectors (e.g. intrusion, fire, water, etc.) should be
connected to a central alarm system rather than using multiple alarm systems.
Ÿ An alarm system should have emergency backup power supply to prevent intruders
from disabling the system by cutting the normal power supply.
CISSP Exam Notes - Physical Security 7
Ÿ An alarm system and the signal transmission medium should be monitored to detect
for tampering.
Ÿ An alarm should be audible for at least 400 feet.
Ÿ An alarm requires a security guard to respond to locally.
4. Fire Protection
4.3 The flash point is the lowest temperature at which a Class B fire will continue to burn.
Fire Detection
4.5 Fire detectors and alarms should be installed with the following considerations:
Ÿ Fire detectors should be installed above ceiling, below raised floor (where wires can
CISSP Exam Notes - Physical Security 8
Fire Suppression
4.6 A heating, ventilation, and air conditioning (HVAC) system has to be stopped
automatically (e.g. by connecting it to the fire alarm system) when there is a fire because
it can supply oxygen to the fire and spread smoke to the other areas.
4.7 A portable fire extinguisher should be used with the following considerations:
Ÿ It should have marking which indicates the type of fire it is designed for. Most
portable fire extinguishers are filled with CO2 or Soda acid.
Ÿ It should be placed within 50 feet of electrical equipment or at an exit.
Ÿ It should be easily reached and can be operated by an average-sized person.
Ÿ It should be inspected by licensed personnel regularly, e.g. quarterly.
4.8 A gas discharge system uses pressurized gas, e.g. CO2 or Halon, to extinguish a fire. It
is recommended for unmanned computer facilities, as the gas will not damage computer
equipment, but may be dangerous to people. In a manned area, a gas discharge system
should have built-in delay (after the fire alarm is triggered) before releasing gas, so that
people have enough time to evacuate.
4.9 CO2 is colorless, odorless and can cause suffocation. It is more suitable for unattended
facilities.
4.10 Halon is harmless to people in small quantity. It should be used with 5% concentration.
If the concentration is above 10%, it can be dangerous to people. It can also deplete
ozone. In an extremely hot fire (> 900 o C), it will even degrade into toxic chemicals.
Because of these problems, it is no longer manufactured since 1994 by international
agreement. Extinguishers using Halon are not allowed to be refilled. However, it is
not necessary to replace them immediately.
4.11 Halon 1211 is a liquid agent used mainly in portable extinguishers. Halon 1301 is a gas
agent used mainly in flooding systems. Halon 1301 requires sophisticated
pressurization.
CISSP Exam Notes - Physical Security 9
4.12 FM-200 is a common replacement for Halon. FM-200 should be used with 7%
concentration. Other replacements for Halon include Argon, Inergen, CEA-410, FE-13
and NAF-S-III.
4.13 A water sprinkler system is an inexpensive fire suppression mechanism. There are
four main types of water sprinkler systems. They are:
1. Wet pipe system (or Closed head system)
Ÿ All the pipes are filled with water.
Ÿ When the temperature increases above a certain threshold, the links melt and
water is released from the sprinkler heads.
Ÿ Water in the pipes may freeze in cold area, which may break the pipes.
2. Dry pipe system
Ÿ All the pipes are filled with air under pressure, and water is held back by valves.
Ÿ If a fire is detected, water will fill the pipes and then begin to sprinkle. During
the time delay when water is filling the pipes, someone can shut down the
sprinkler system, if necessary (e.g. for false alarm).
Ÿ It is suitable for cold climate.
Ÿ It does not react as fast as the wet pipe system.
3. Pre-action system
Ÿ Water is not held in the pipes in normal situation.
Ÿ When the temperature exceeds a certain threshold, water is released into the
pipes, but is not yet released from the sprinkler heads until the links melt
(combine the wet pipe system and dry pipe systems).
Ÿ It is designed for equipment that is costly such that water damage should be
avoided in a small fire (leaving it to hand-held fire extinguisher).
Ÿ It is suitable for data processing environment.
4. Deluge system
Ÿ It is similar to the dry pipe system except that all the sprinkler heads are opened,
so that a larger volume of water can be released over a large area in a short
period of time.
Ÿ It is not suitable for data processing environment.
4.14 A water sprinkler system should be used with the following considerations:
Ÿ Water can increase the fire intensity in an electrical fire. Therefore, electrical power
should be shut down automatically (e.g. by connecting it to the fire alarm system)
before water is discharged from the sprinkler heads.
Ÿ Each sprinkler head should be activated individually to avoid wide-area water
damage.
CISSP Exam Notes - Physical Security 10
5. Power Protection
5.3 UPS is designed for protection against a short duration power outage, or for providing
enough time for system administrators to shut down the systems and equipment orderly.
Backup power source such as motor generator is designed for protection against a long
duration power outage.
CISSP Exam Notes - Physical Security 11
5.5 Clean power refers to stable power with no voltage fluctuation or interference. It is
necessary for power-sensitive equipment.
5.6 Interference or noise is a random disturbance of power. There are two types of
interference:
Ÿ Electromagnetic interference (EMI)
Ÿ created by the charge difference between the 3 electrical wires (hot, neutral and
ground).
Ÿ induced by motors, lightning, etc.
Ÿ Radio frequency interference (RFI)
Ÿ created by the components of an electrical system, and electrical cables.
Ÿ created by fluorescent lighting, truck ignition, etc.
6.1 A HVAC system is a control system which governs heating, ventilation and air
conditioning. It can be used to control the temperature, humidity and contamination
(e.g. dust, dirt, smoke, gas, etc.) of a facility.
6.3 The relative humidity of a data center should be maintained between 40 – 60%. If the
humidity is too low, there may be excessive static electricity. If the humidity is too high,
there may be condensation and corrosion. The humidity can be monitored by a
hygrometer.
CISSP Exam Notes - Physical Security 12
6.4 To avoid contamination and to maintain air quality, a data center should use a closed-
loop re-circulating air conditioning system and maintain positive air pressure inside the
center (i.e. when the door is open, air will not flow in the room because of the higher
pressure inside).
6.5 Liquid and gas lines must have shut-off valves and leakage sensors . The lines should
maintain positive flow (i.e. liquid or gas should flow out instead of flow in a building).
6.6 Static electricity can be prevented by using anti-static floor, anti-static carpet (or not use
carpet) and anti-static band. Proper humidity and grounding are also required.
7.1 There are several types of controls for ensuring system availability:
Ÿ Hardware maintenance, with service level agreements (SLAs) with the
maintenance service suppliers.
Ÿ Hardware redundancy, e.g. RAID disk, clustering, spare equipment.
Ÿ Regular backup of data and systems (Details can be found in Chapter 9).
Ÿ Alternate site or Disaster Recovery (DR) site (Details can be found in Chapter 10).
7.2 There are two important concepts when determining the requirement of controls for
system availability:
Ÿ Mean-Time-Between-Failure (MTBF) – expected time a device can function before
failure.
Ÿ Mean-Time-To-Repair (MTTR) – expected time required to repair a device.
7.4 Redundant Array of Inexpensive Disks (RAID) makes use of redundant physical hard
disks to increase the availability of a logical disk. There are several levels of RAID.
The common RAID levels are listed below:
Ÿ Level 0 – Stripping, i.e. a large logical disk which has data being divided and written
over several physical disks. It can improve the logical disk performance, but has no
redundancy. Failure of one physical disk will make the whole logical disk fails.
CISSP Exam Notes - Physical Security 13
Ÿ Level 1 – Disk mirroring, i.e. all data on a physical disk are duplicated to a mirror
disk, and all modifications are made to the both disks simultaneously.
Ÿ Level 2 – Stripping plus hamming code parity at bit level for redundancy (32 disks
for storage and 7 disks for parity). This level is seldom used in the real world.
Ÿ Level 3 – Byte level stripping plus parity (N data disks and 1 parity disk).
Ÿ Level 4 – Block level stripping plus parity (N data disks and 1 parity disk).
Ÿ Level 5 – Block level stripping plus interleaved parity, i.e. parity information is
interleaved across all physical disks (N+1 disks). The logical disk performance is
better than that of Levels 3 and 4 because of the distribution of parity information.
It is the most widely used RAID level.
Ÿ Level 6 – Block level stripping plus two sets of parity (N+2 disks). A logical disk
can operate without data loss even if at most two physical disks failed.
(For Levels 1-5, a logical disk can operate without data loss if at most one physical
disk failed.)
Ÿ Level 10 – Level 1 + Level 0, i.e. stripping across multiple RAID-1 disk pairs.
Ÿ Level 01 – Level 0 + Level 1, i.e. 2 x RAID-0 disk groups, each disk group is a
mirror of the other.
Ÿ Level 15 – Level 1 + Level 5, i.e. stripping with interleaved parity across multiple
RAID-1 disk pairs.
Ÿ Level 51 – Level 5 + Level 1, i.e. 2 x RAID-5 disk groups, each disk group is a
mirror of the other.
7.5 Most RAID systems support hot swapping disks, i.e. replacement of a failed hard disk
and reconstruction of the contents of the failed disk onto a replacement disk while the
system is running.
7.6 The RAID Advisory Board introduced the concept of Extended Data Availability and
Protection (EDAP) in 1997, which is a classification system for the resilience of an
entire storage system rather than just a disk-based storage as in the RAID classification.
The classification system contains the following classes:
Ÿ FRDS (failure-resistant disk system):
1. Protection against data loss and loss of access due to disk failure.
2. Ability to reconstruct the failed disk contents onto a replacement disk.
3. Protection against data loss due to the failure of a system component.
4. Active component monitoring and failure indication.
Ÿ FRDS+:
5. Features 1-4.
6. Hot swapping.
7. Protection against data loss due to cache, power and other environmental
CISSP Exam Notes - Physical Security 14
failures.
Ÿ FTDS (failure-tolerant disk system):
8. Features 1-7.
9. Protection against loss of access due to device channel and controller failure.
Ÿ FTDS+:
10. Features 1-9.
11. Protection against loss of access due to bus and power failure, and component
replacement.
Ÿ FTDS++:
12. Features 1-11.
13. Protection against data loss and loss of access due to multiple disk failures.
Ÿ DTDS (disaster-tolerant disk system):
14. Features 1-11.
15. Protection against data loss due to complete failure of one zone (distance
between two zones > 1 km).
Ÿ DTDS+:
16. Features 1-11.
17. Protection against data loss due to complete failure of one zone (distance
between two zones > 10 km).
7.7 A Storage Area Network (SAN) is composed of storage systems and servers connected
by switching fabric, such that multiple servers can share the same storage systems.
Redundancy and fault tolerance can be built into the switching fabric to increase the
availability of access to the storage systems.
7.8 Fault tolerance means that a system can detect if there is a fault and can correct it or
work around it automatically.
7.9 Clustering is a fault tolerant server technology. A group of servers working together as
a logical unit to provide load balancing, redundancy and fail-over functions. If any one
server fails, the other servers will pick up the load of the failed server.
CISSP Exam Notes 15
CHAPTER 1. INTRODUCTION................................................................................................................................... 1
1. INTRODUCTION ....................................................................................................................................................35
2. FACILITY REQUIREMENT ....................................................................................................................................36
3. PERIMETER SECURITY ........................................................................................................................................37
4. FIRE PROTECTION................................................................................................................................................41
5. POWER PROTECTION ...........................................................................................................................................44
6. GENERAL ENVIRONMENTAL PROTECTION .......................................................................................................45
7. EQUIPMENT FAILURE PROTECTION ..................................................................................................................46
1. INTRODUCTION ....................................................................................................................................................49
2. IDENTIFICATION ...................................................................................................................................................49
3. A UTHENTICATION................................................................................................................................................51
4. A UTHORIZATION ..................................................................................................................................................58
5. A CCOUNTABILITY................................................................................................................................................59
6. A CCESS CONTROL M ODELS...............................................................................................................................60
CISSP Exam Notes 16
CHAPTER 7. CRYPTOGRAPHY.............................................................................................................................104
APPENDIX ...........................................................................................................................................................................183
INDEX ....................................................................................................................................................................................186
CISSP Exam Notes 18
Copyright© 2003 by the KP Lab Limited. All rights reserved. No part of this publication
may be reproduced or distributed in any form or by any means, or stored in a database or
retrieval system, without the prior written permission of the publisher.
ISBN 988-97323-1-9
Publisher KP Lab Limited
Author K. Wan
Web Site www.kp-lab.com
e-mail [email protected]
K. Wan, MSc., CISSP, CCNP, CCSE, MCSE, MCDBA, SCSA, SCNA, SCJP, has ten years’
experience in system and security administration on various computing platforms. He is
currently an IT infrastructure and security manager working in Hong Kong.