IncidentResponsev2

4.53 Evaluate Physical Security and Physical Access

Task

Assess the physical security posture of the environment to identify unauthorized physical access risks, vulnerabilities in physical controls, and signs of potential compromise through physical means.


Conditions

Given access to the physical premises, coordination with building security and IT staff, and knowledge of organizational physical security policy.


Standards


End State

All physical security risks are identified, documented, and escalated. Unauthorized access risks are mitigated or removed.


Notes


Manual Steps

Step 1: Review Access Control Mechanisms

Areas to check:

Location What to Look For
Exterior Doors Secure locks, badge readers, alarms
Reception Area Visitor check-in process
Data Centers / Server Rooms Electronic locks, CCTV coverage, restricted badge access
Wiring Closets Locked doors, no piggybacking
Work Areas Workstations unattended, no passwords/screensavers active

Operator Note: Review badge access lists to ensure only authorized personnel have access.


Step 2: Validate Monitoring and Surveillance Systems

Review:

Operator Note: If footage cannot be reviewed or is unavailable → log as critical deficiency.


Step 3: Conduct Physical Walkthrough and Inspection

Observe:

Operator Note: Use combination of visual inspection and local network scans to detect rogue devices.


Step 4: Review Access Logs and Visitor Records

Collect:

Operator Note: Look for access outside of normal business hours or into restricted areas.


Step 5: Interview or Coordinate with Facility Staff

Operator Note: Cleaning and maintenance staff often overlooked → insider risk.


Step 6: Identify and Report Deficiencies

Example issues to flag:

Deficiency Example
Unlocked wiring closet Open door in hallway with access to network switch
No camera coverage Blind spots near server racks
Unlogged visitor Delivery contractor with no sign-in
Abandoned USB drive Possible malicious device left intentionally

Operator Note: Work with site security to immediately secure critical deficiencies.


Dependencies


Other Available Tools

Tool Platform Installation Usage
Security Cameras / DVR Physical Site managed Video review
Badge Reader Logs Physical Site managed Access audit
Netspot / WiFi Explorer Windows/macOS Passive wireless scan Detect rogue APs
Mobile phone / laptop Cross-platform On person Detect open ports/APs, visual inspection

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References


Revision History

Date Version Description Author
2025-05-02 1.0 Created from scratch with deep operator-focused physical security evaluation process Leo