What makes a Physical Security assesment successful? Do's and Do not's? https://www.rallypoint.com/answers/what-makes-a-physical-security-assesment-successful-do-s-and-do-not-s <div class="images-v2-count-0"></div>Huge part of InfoSec, and I believe is overlooked is Physical Security. I want to be successful in securing my Network logically and physically. What do you look for when doing a physical security assessment? Thu, 03 Mar 2016 10:51:06 -0500 What makes a Physical Security assesment successful? Do's and Do not's? https://www.rallypoint.com/answers/what-makes-a-physical-security-assesment-successful-do-s-and-do-not-s <div class="images-v2-count-0"></div>Huge part of InfoSec, and I believe is overlooked is Physical Security. I want to be successful in securing my Network logically and physically. What do you look for when doing a physical security assessment? SPC(P) Private RallyPoint Member Thu, 03 Mar 2016 10:51:06 -0500 2016-03-03T10:51:06-05:00 Response by SPC Andrew Griffin made Mar 3 at 2016 10:53 AM https://www.rallypoint.com/answers/what-makes-a-physical-security-assesment-successful-do-s-and-do-not-s?n=1350395&urlhash=1350395 <div class="images-v2-count-0"></div>This is a Loaded Question! I will need to get back to you! SPC Andrew Griffin Thu, 03 Mar 2016 10:53:59 -0500 2016-03-03T10:53:59-05:00 Response by SSG Ed Mikus made Mar 3 at 2016 11:23 AM https://www.rallypoint.com/answers/what-makes-a-physical-security-assesment-successful-do-s-and-do-not-s?n=1350474&urlhash=1350474 <div class="images-v2-count-0"></div>If a pen tester did not gain access, don't hire them again. there is always a way in. as for physical security, if i can access any input output device directly you could have problems. most sensitive are: keyboard, bluetooth, cd drive, wifi, network cable (i don't have to unplug it either) USB, firewire, this list could go on for a while. if i can access any of the things listed i can own your computer. the biggest thing is the assessment, do not spend more protecting your systems than they are worth, that includes more than just the hardware but the data in it, its value to other people and many other things. SSG Ed Mikus Thu, 03 Mar 2016 11:23:06 -0500 2016-03-03T11:23:06-05:00 Response by Sgt Aaron Kennedy, MS made Mar 3 at 2016 11:30 AM https://www.rallypoint.com/answers/what-makes-a-physical-security-assesment-successful-do-s-and-do-not-s?n=1350494&urlhash=1350494 <div class="images-v2-count-0"></div>Think of your location like a "safe." Start by looking at the outside and see what the access points are and if there are any other vulnerabilities.<br /><br />As an example, if you have a room where all your network infrastructure is located, how do you get into the room? Can you get into the room another way? With or without damage? Will those methods be "detectable" or "trackable." (Will you know someone has been inside). The best container is worthless of everyone has a key, and you can't tell who has been in it.<br /><br />If the network expands out of that space, is it vulnerable along the way? (non-encrypted). Can its protections be bypassed if someone has physical access to them? Sgt Aaron Kennedy, MS Thu, 03 Mar 2016 11:30:53 -0500 2016-03-03T11:30:53-05:00 2016-03-03T10:51:06-05:00