2 cissp ® Official Study Guide Eighth Edition


Perimeter Security Controls



Download 19,3 Mb.
Pdf ko'rish
bet399/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   395   396   397   398   399   400   401   402   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

 Perimeter Security Controls 
The accessibility to the building or campus location is also important. Single entrances are 
great for providing security, but multiple entrances are better for evacuation during emer-
gencies. What types of roads are nearby? What means of transportation are easily acces-
sible (trains, highway, airport, shipping)? What about traffi c levels throughout the day? 
Keep in mind that accessibility is also constrained by the need for perimeter security. 
The needs of access and use should meld and support the implementation and operation of 
perimeter security. The use of physical access controls and monitoring personnel and equip-
ment entering and leaving as well as auditing/logging all physical events are key elements in 
maintaining overall organizational security.
 Fences, Gates, Turnstiles, and Mantraps 
A
fence
is a perimeter-defi ning device. Fences are used to clearly differentiate between 
areas that are under a specifi c level of security protection and those that aren’t. Fencing can 
include a wide range of components, materials, and construction methods. It can consist 
of stripes painted on the ground, chain link fences, barbed wire, concrete walls, and even 


Implement and Manage Physical Security 
423
invisible perimeters using laser, motion, or heat detectors. Various types of fences are effec-
tive against different types of intruders:

Fences 3 to 4 feet high deter casual trespassers.

Fences 6 to 7 feet high are too hard to climb easily and deter most intruders, except 
determined ones.

Fences 8 or more feet high with three strands of barbed wire deter even determined 
intruders.

gate
is a controlled exit and entry point in a fence. The deterrent level of a gate must 
be equivalent to the deterrent level of the fence to sustain the effectiveness of the fence as 
a whole. Hinges and locking/closing mechanisms should be hardened against tampering, 
destruction, or removal. When a gate is closed, it should not offer any additional access 
vulnerabilities. Keep the number of gates to a minimum. They can be monitored by guards. 
When they’re not protected by guards, use of dogs or CCTV is recommended.

turnstile
(see Figure 10.4) is a form of gate that prevents more than one person at a 
time from gaining entry and often restricts movement in one direction. It is used to gain 
entry but not to exit, or vice versa. A turnstile is basically the fencing equivalent of a 
secured revolving door.
F I g u R e 10 . 4
A secure physical boundary with a mantrap and a turnstile
Secured area
Turnstile
Mantrap

mantrap
is a double set of doors that is often protected by a guard (also shown in 
Figure 10.4) or some other physical layout that prevents piggybacking and can trap indi-
viduals at the discretion of security personnel. The purpose of a mantrap is to immobilize a 
subject until their identity and authentication is verified. If a subject is authorized for entry, 
the inner door opens, allowing entry into the facility or onto the premises. If a subject is 
not authorized, both doors remain closed and locked until an escort (typically a guard 
or a police officer) arrives to escort the subject off the property or arrest the subject for 


424
Chapter 10 

Physical Security Requirements
trespassing (this is called a 
delay feature
). Often a mantrap includes a scale to prevent pig-
gybacking or tailgating.
Another key element of physical security, especially for data centers, government facili-
ties, and highly secure organizations, is security bollards, which prevent vehicles from 
ramming access points. These can be permanently fixed in place or automatically rise from 
their installed base at a fixed time or an alert. They are often disguised as planters or other 
architectural elements.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   395   396   397   398   399   400   401   402   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish