310 likes | 458 Views
De-layering Facility Security. Norman Mortell. Introduction . Background. Why is Security Important? Security Survey. Seven Key Security Factors. Summary Example. Resources. . Background . Academia/Pharma/Contract/Dark Side. Targeted by Extremists (home/work).
E N D
De-layering Facility Security Norman Mortell
Introduction • Background. • Why is Security Important? • Security Survey. • Seven Key Security Factors. • Summary Example. • Resources.
Background • Academia/Pharma/Contract/Dark Side. • Targeted by Extremists (home/work). • Designed Facilities/Security Advice. • Obtained Secured by Design status. • Directed Security Division for 5 Years. • Trained Security Awareness to 3500. • Drinking is a hobby, this is my day job!
Why is Security Important? • All Potential ARE Targets/Europe/USA. • Business Continuity – Assessing Risk. • Contingency Planning – Proactive. • It’s Just Good Business Sense! • Govt. Pressure – Baseline Screening. • Security Aware = Harder Target. • Complacency is Dangerous. • Security is Everybody's Responsibility.
Security Survey Public access to facilities
Seven Key Factors All Factors Interact All Equally Important
External Security Issues • Extremists. • Theft and Other Social Issues. • Public Opinion/Politics. • Disease Outbreaks. • Wide Area Disruptions. • Neighbouring Properties. • Natural Disasters. • Monitor the “Noise”.
Location Issues • Response Times. • Site Access Points. • Public Access. • Demonstration Control? • Critical Suppliers. • Separate Facilities/Sites. • Different Country/Culture Issues. • In all cases liaise with Police!
Policies • Lack of business continuity plans and/or testing of plans. • Link Security to H & S/H. O. Needs. • Confidential Reporting of concerns. • Response Team/Media Training? • Consideration of Employees. • Practical Policies e.g. Post Handling. • Communicate/Train People in Policies..
Physical Security • Consider “Secured by Design”. • Evaluate Security at Design Stage. • Access Controls/Pass Zones. • CCTV (in & out)/Alarms/Lone Workers. • Emergency Power/Phones etc. • Windows/Doors/Air-Locks/Barriers....
Data Security • Data Management: • System needs to safeguard the: • Confidentiality, Integrity, Availability • of written, spoken and computer info. • Info. Taken From Site – Laptops/Talks. • Live Data, Reporting, Archiving. • Social Engineering, Storage Devices.
Data Security • Consider ISO27001. • Clean Desk Policy, Access, Storage • E-Mail Policy, Use, Out of Office. • Network/Web Security/Encryption. • Database Access/Disaster Recovery. • BS8470 Destruction of Materials.
People • Security in Recruitment Processes. • Security Screen Staff/Agency Staff. • Have Signed Confidentiality Forms. • Train Staff in Security Awareness. • Include Security Aspects in Reviews. • Use “Company” Pens. • Escort Visitors/Strangers. • Don’t Give Away Your Password (phrase).
“Sorry about the smell, I have had all my passwords tattooed between my toes!” Action Plan – What can you do?
Lab Areas • Zone restricted areas for: • Bio-Security. • Access Control. • Staff Screening – current staff? • Mobile Phone Use. • Data Systems Access. • Radio Isotopes/Carcinogens. • Waste Disposal.
Summary All Factors Interact All Equally Important
Risk Assessment Traffic Light High: Animal Area Medium: Admin. Low: Grounds
Resources • www.securedbydesign.com • www.mi5.gov.uk • www.cpni.gov.uk • www.berr.gov.uk • www.ico.gov.uk/ • www.bsi-uk.com/InformationSecurity • www.nationalarchives.gov.uk • www.londonprepared.gov.uk/businesscontinuity/assessingyourrisk/ • www.agenda-security.co.uk