Session 3
Session 3
• Surveillance Systems
Handling storage media
• Encrypt the backup files
• Planned verification and duplication
• Disposal of media
• Equipment sent for maintenance
• Storage records
– Identifier for each storage medium
– Location identity of the storage medium
– Name of the operator who has the ultimate responsibility for a particular
storage medium
– File stored on the medium
– Authorized persons to access the storage medium
– Date of purchase of the medium
– Access history of the medium
– History of the read and write errors.
Access to systems
• Identification, Authentication, Authorization,
Accountability.
• Evaluate physical authentication devices.
– Card-key readers
– Biometric devices
– Traditional key locks
Biometric types Response time Accuracy
• Access to Data
– MAC, DAC, RBAC ….
• Should check device logs for information like
– user identification
– time and place of the access attempt
– Success or failure of the access attempt
Summary
• Threats to information security that are unique to
physical security
• Key physical security considerations in a facility site
• Physical security monitoring components
• Essential elements of access control
• Fire safety, fire detection, and response
• Importance of supporting utilities, especially use of
uninterruptible power supplies
• Countermeasures to physical theft of computing devices
CHECKLIST
Contr
Compli Recomm
Control Control Control Type of ol Comme
Requirement Controls Evidence Findings ant ended
Category No. Owner Control Effici nts
Status Control
ency
Whether User
IDs are granted
Naming
in a unique
CO8 IT Team Preventive convention
format?
Document
Does anyone
have admin
CO9 rights to the IT Team Preventive Evidence
Enforcing the security
mission critical
and adequacy of user
systems?
access across systems
and applications is a Logical
key activity to assess access
and lower those risks. How are admin
control rights granted
Hence it is great need
of verification of all CO10 to the users to IT Team Preventive Evidence
logical access controls mission critical
systems?
Are appropriate
approvals taken
before providing
admin access to
CO11 IT Team Preventive Approvals
the users to
mission critical
systems?
Audit Objectives
• Test of Physical construction
• Test of Fire-Detection System
• Test of Access Control
• Test of backup Power supply
• Test if procedures for storage media handling
are followed, logs are maintained, if storage
media found lying around, unattended find out
the contents, verify process for media disposal
Data Center - Security and Risk Management
• https://www.youtube.com/watch?v=8g0NrHE
xD3g
Checklists (Internal controls questionnaire)