Content: Physical Security of Facilities and IT Infrastructure Rooms (Layer 1)
Content: Physical Security of Facilities and IT Infrastructure Rooms (Layer 1)
Introduction
Physical security of Facilities and IT Infrastructure Rooms (Layer 1)
Protected Wire Distribution Systems (Layer 2)
Network Security (Layer 3)
Certification, accreditation, oversight and compliance (Layer 9)
In this module we will investigate the security vertical, discovering all the ways security of information
systems is achieved on various layers of the 10 layer model. We will look at specific layers of the rubric
and explore where vulnerabilities can occur, and consider ways to mitigate these vulnerabilities. Students
will be given the opportunity to brainstorm on securing the layers we don't cover in this module.
In the previous module we went down the model starting at layer 10 to learn about management of
information systems, this module we walk up the model from the bottom, starting at layer1.
External site perimeter considerations include fences and barricades, perimeter surveillance, gate locks,
pedestrian and vehicle access points (turnstiles, etc.). These can be manned or guarded by access codes
or other automated entrance protection means to mediate access at higher layers. Facility access
considerations include security guards, cleaning crew and visitor control.
Site risks can originate from unforeseen accidental events. Protection of physical facilities against
disasters that can occur from man-made accidents or natural disasters need to be considered. Mitigation
plans to protect against these include disaster recovery plans, redundant data paths, robust duplicated
utility feeds, off site processing and onsite and offsite storage back-ups. Also maintaining updated contact
lists and communications plans when a disaster occurs can help to facilitate coordination and execution
of responses to situations. Lastly, cross training on critical job functions may be needed if people are not
available to perform a particular activity that they usually do.
When providing physical security of IT infrastructure rooms, organizations must provide a strategy for
controlled access to physical locations. This includes wire closets, computer rooms, and network
distribution frames. Security of automated infrastructure control takes the form of Power/UPS/Generators,
cooling systems, fire control and extinguishing systems. When dealing with secured facilities, TEMPEST
shielding can be employed to control external or internal RF communications for buildings in the case of
classified processing and storage.
Other techniques for protecting transmission media include providing penetration protection of wiring to
include using electromagnetic (sheathing) to protect leakage of communications and pressurized conduit
to protect against the elements (cold, heat, moisture etc.). Also organizations should perform regular and
periodic visible physical inspection of conduit to ensure their integrity. Lastly it is recommended they
control access areas for terminations and provide physical separation of wiring for different levels of
security or sensitivity.
A great deal of information systems operations is reliant on the Internet as a communications mechanism.
However the Internet was not originally designed with much security in mind. The original vision for the
Internet was to provide a group of mutually trusting users attached to a transparent network.
Consequently Internet Protocol (IP) designers are playing "catch-up" and security considerations are
needed.
Below I will overview some of the protection mechanisms and strategies being employed to protect data
and services on the Internet.
Firewalls
Firewalls are computing devices that permit or deny network transmissions based upon a set of rules
encoded in the device. These rules disallow unauthorized access to networks while permitting authorized
communications to pass.
All traffic between external and internal networks should go through the firewall. A firewall ensures only
authorized traffic, as defined by policy, goes in and out. There is typically a zone between the internal and
external routers known as the de-militarized zone (DMZ) where outward-facing services can live.
Types of Firewalls
Fig. vii
Encryption has long been used by militaries and governments to facilitate secret communications, but is
now commonly used in protecting information within many kinds of civilian system. Any data transmitted
in the open is a candidate to be protected by encryptions. Encryption is used to protect data being
transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones,
wireless intercom systems, Bluetooth devices and bank automatic teller machines.
There are 2 types of cryptology, Symmetric and Asymmetric. In Symmetric cryptology, the encryption key
and decryption key are identical. This is "Classic" cryptography. This typically takes the form of some
combination of substitution and permutation. Examples include most Government Cryptographic
Systems, DES, and AES
With Asymmetric cryptology, the decryption key cannot be derived from the encryption key. Public key
encryption describe a cryptographic system requiring two separate keys, one to lock or encrypt the
plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One of these
keys is published or public and the other is kept private.
Public Key cryptology was invented in the mid 1970's and is typically based on a hard mathematical
problem. Examples include Diffie-Hellman, and RSA.
Fig. viii
Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to
create, manage, distribute, use, store, and revoke digital certificates that support public cryptology.
Digital Certificate
Digital Cert is signed by the Certificate Authority. Everyone has the public key of the CA and uses that to
get the name and public key of the person or company that you need to deal with.
Combining factors increases confidence (Multifactor Authentication). Once the identity is established,
Authorization determines what a subject can do on the system.
Access Control regulates which users or processes have access to which resources (files, processes,
networks, and data). Access control provides protection against insiders and outsiders. The objectives of
access control are to provide:
Once an information system is operational, there may need to be a periodic review (oversight) of the
system to assure the compliance with policies and legalities stipulated in Layer 10. This is called
Oversight & Compliance. This is typically a Layer 9 process that monitors the threads (information flows)
within an information system and ensures that the policies and legalities are being enforced. Examples
include privacy of health care records and protection of case information within law enforcement
i http://www.treehugger.com/linked-hybrid-beijing-china-2.jpeg
ii http://www.theflagstaffgroup.com/chainlink.jpg
iii http://www.globsec.com/images/facility_2.jpg
iv http://www.mistletoestorage.com/images/security-features-7.jpg
v http://webecoist.com/2008/10/30/30-devastating-land-water-fire-and-sky-disasters/?ref=search
vi http://www.gobackup.net/en_US/images/marketing/power%20cable.jpg
vii http://www.safehousesoftware.com/images/Encryption.jpg
viii http://www.cio.wisc.edu/security/digitalCert/images/pki_yellow_key.jpg