What are physical security controls?
Physical security controls are measures designed to protect the overall IT infrastructure by complementing logical security features.
What do logical security features include?
Logical security features include permissions, firewall rules, and data encryption, which are not physical devices.
What do physical security controls help prevent?
They help prevent unauthorized access, tampering, or theft of hardware or sensitive data.
What are the layers of physical security controls?
Physical security controls are typically layered into perimeter, facility, and device-level controls.
What is an access control vestibule?
An access control vestibule, or mantrap, is a two-door system requiring authentication at each point to prevent tailgating and piggybacking.
What are some examples of access control methods?
Access control methods include mechanical and electronic door locks, PIN pads, card-based locks, and biometric systems.
What is the purpose of fencing in perimeter security?
Fencing helps to deter unauthorized entry and define boundaries.
What is a bollard?
A bollard is a physical barrier to stop vehicle-based threats, often placed near data centers and main entrances.
What are badge readers used for?
Badge readers scan access cards and can log entry times and trigger alerts for unauthorized scans.
What types of biometric authentication are there?
Biometric authentication includes:
What are some surveillance techniques used in physical security?
What is the benefit of integrating surveillance with logical access control systems?
Integration creates an audit trail, allowing for review of access.
What is a best practice for physical security implementation?
Performing regular risk assessments to identify vulnerabilities is a best practice.
What is logical security in IT environments?
Logical security focuses on controlling digital access to systems, networks, and data, complementing physical security by protecting against both remote and internal threats.
What are the core components of logical security implementation?
The core components include:
What is multi-factor authentication?
Multi-factor Authentication (MFA) enhances security by requiring more than one means of identifying yourself, typically a combination of something you know, have, and are.
What are common elements of multi-factor authentication?
Common elements include:
password (something you know)
a smartphone or token (something you have)
biometrics (something you are)
How does multi-factor authentication improve security?
It makes it more difficult for intruders to gain access, as they would need to compromise at least two factors.
What are examples of multi-factor authentication tools?
Examples include Microsoft Authenticator, Google Authenticator, and codes sent via text message.
What is zero trust architecture?
Zero-trust Architecture is based on continuous authentication and authorization, implementing least privilege access and micro-segmentation of network resources.
What does least privilege access entail?
Least privilege access means granting only the minimum level of access necessary to perform a task.
What are identity-aware firewalls?
Identity-aware firewalls are aware of both the port/protocol and the identity attempting to gain access.
What are conditional access policies?
Conditional access policies evaluate specific conditions during access attempts, such as network location or device health.
What is an Access Control List (ACL)?
An ACL specifies identities and their corresponding levels of access, implemented for file systems and network devices.