SPC(P) Private RallyPoint Member1350381<div class="images-v2-count-0"></div>Huge part of InfoSec, and I believe is overlooked is Physical Security. I want to be successful in securing my Network logically and physically. What do you look for when doing a physical security assessment?What makes a Physical Security assesment successful? Do's and Do not's?2016-03-03T10:51:06-05:00SPC(P) Private RallyPoint Member1350381<div class="images-v2-count-0"></div>Huge part of InfoSec, and I believe is overlooked is Physical Security. I want to be successful in securing my Network logically and physically. What do you look for when doing a physical security assessment?What makes a Physical Security assesment successful? Do's and Do not's?2016-03-03T10:51:06-05:002016-03-03T10:51:06-05:00SPC Andrew Griffin1350395<div class="images-v2-count-0"></div>This is a Loaded Question! I will need to get back to you!Response by SPC Andrew Griffin made Mar 3 at 2016 10:53 AM2016-03-03T10:53:59-05:002016-03-03T10:53:59-05:00SSG Ed Mikus1350474<div class="images-v2-count-0"></div>If a pen tester did not gain access, don't hire them again. there is always a way in. as for physical security, if i can access any input output device directly you could have problems. most sensitive are: keyboard, bluetooth, cd drive, wifi, network cable (i don't have to unplug it either) USB, firewire, this list could go on for a while. if i can access any of the things listed i can own your computer. the biggest thing is the assessment, do not spend more protecting your systems than they are worth, that includes more than just the hardware but the data in it, its value to other people and many other things.Response by SSG Ed Mikus made Mar 3 at 2016 11:23 AM2016-03-03T11:23:06-05:002016-03-03T11:23:06-05:00Sgt Aaron Kennedy, MS1350494<div class="images-v2-count-0"></div>Think of your location like a "safe." Start by looking at the outside and see what the access points are and if there are any other vulnerabilities.<br /><br />As an example, if you have a room where all your network infrastructure is located, how do you get into the room? Can you get into the room another way? With or without damage? Will those methods be "detectable" or "trackable." (Will you know someone has been inside). The best container is worthless of everyone has a key, and you can't tell who has been in it.<br /><br />If the network expands out of that space, is it vulnerable along the way? (non-encrypted). Can its protections be bypassed if someone has physical access to them?Response by Sgt Aaron Kennedy, MS made Mar 3 at 2016 11:30 AM2016-03-03T11:30:53-05:002016-03-03T11:30:53-05:002016-03-03T10:51:06-05:00