90 likes | 200 Views
Physical Security For System Administrators. John Mark Smotherman. Overview. Think Using Attack Vectors Electronic Security - attacks from the network Physical Security - attacks on the physical machine or environment Electronic security means nothing if they can touch the machine! Design
E N D
Physical Security For System Administrators John Mark Smotherman
Overview • Think Using Attack Vectors • Electronic Security - attacks from the network • Physical Security - attacks on the physical machine or environment • Electronic security means nothing if they can touch the machine! • Design • Hardened Core • Personnel • Social Attacks
Importance • Why should a future sysadmin care about physical security? • That’s Security’s Job! • Overlap • System Administration/Facilities • Server security/server room security • Input into server room design • Responsibility for security camera feeds • High Security Jobs • Military, Data Warehousing for Companies
Hardened Core • Physical Defense-in-Depth • Multiple checkpoints • Data Centers should be like Ogres • Sectioning and Layering by access • Sole Purpose Rooms • Access Control • Server Room Design • Secure HVAC • No windows • What happens during an emergency, e.g. a fire?
Access • Two- and Three-Factor Security • Something You Have • Something You Are • Something You Know • Electronic Access (Databases) • Separation of Authentication • Requires Multiple Attack Vectors to Break • Differing Keys • Differing Servers
Personnel • Breaches waiting to happen • Tailgating • Cleaning Personnel • Facilities (e.g. HVAC) • Malicious Attacks • How to deal with this? • Training! • Mantrap/Turnstyle • Guards, Escorts
Case In Point • Data Warehouse • Server farm machines or space • Rented out to various companies • Secure Design • What happens when the IBM rep wants access to his machines, and they’re next to the Intel ones? • Intel = • Importance of Hardened Core and Sole Purpose
The Take-Away • Physical Security Matters! • Hardened Core/Defense In Depth • Casing the Joint • Think like a criminal • Social Attack Vectors Matter Just as Much as Physical and Electronic Ones
Etc. • Van Eck Phreaking • Reading your screen through the wall • Trash • Secure, monitored disposal • Job Descriptions • Don’t let an attack vector go unprotected because you can’t agree who has to do it!