Insights

Does Your Cyber Security Strategy Include a Perimeter Defense?

Fabio Lior Rahamim, UST

The CIA Triad reflects a fundamental truth: in today’s world, it is essential for organizations to protect sensitive data from unauthorized access.

Fabio Lior Rahamim, UST

The first line of defense for any organization is at the physical perimeter of the building or campus, which may be protected by gates, locks, security guards, closed-circuit TVs, front desk personnel, and more. This is especially true when it comes to implementing a cyber security perimeter defense for areas like the server room where sensitive data - a high value resource - is stored.

But even using perimeter barriers and intrusion-detection devices, how effective are most organizations at protecting the perimeter? Despite the immense amount of money invested annually in perimeter defenses, and the startling size of the industry – $34.3Bn was the total value of world production of physical security products for 2019 – most organizations have glaring holes in basic protection at the physical perimeter.

It seems so simple – to keep the doors locked, for example, or to ensure security monitors are working effectively. Yet, perimeter defense is far from simple, and it’s crucial to cyber security to effectively protect your organization’s “crown jewels.” With so many of us working at home due to COVID-19 and offices only partially staffed, this may be more relevant than ever before.

Let’s look at some of what needs to be done to improve an organization’s security at the perimeter.

PLANNING & IMPLEMENTING A SECURE SYSTEM

The first step in securing the physical perimeter requires a careful check of an organization’s physical setup:

PHYSICAL PERIMETER SECURITY IS LINKED TO INFORMATION SECURITY

The American Central Intelligence Agency (CIA) refers to the CIA Triad – a model for the development of security policies that relies on three “legs”: Confidentiality, Integrity and Availability.

The CIA Triad reflects a fundamental truth: in today’s world, it is essential for organizations to protect sensitive data from unauthorized access.

As pointed out in Adnan Raj’s article on multi-factor authentication in The Atlantic, privacy regulations like General Data Protection Regulation (GDPR) place tremendous demand on any organization handling sensitive data – to ensure the data’s integrity and keep it secure.

And protecting your data starts with a perimeter defense that includes limiting physical access.

That means employees need to be authorized to enter certain areas or to access specific parts of the network. One obvious example, to illustrate the point: only a minimal number of employees should have permission to enter the server room in order to limit the possibility of someone doing damage – intended or malicious.

The techniques for limiting access to sensitive data include, but are not limited to:

WHY CYBER SECURITY STRATEGY INCLUDES PEN TESTING – THE NITTY GRITTY OF BREAKING IN

Penetration tests are an important way to check the effectiveness of your organization’s security system at the physical perimeter.

But how do pen tests work? Let’s look at some of the more common strategies:

The Dangers of Social Engineering

Information gained through social engineering can be used by anyone who wants to cause damage – for example, a current or former employee who wants to hurt the organization, people coming from competing organizations, or hackers interested in leveraging an attack for ransom. Here are some of the classic methods of attack that are used to break in:

Leveraging Technical Weaknesses in the Security System

Another system involves identifying the vulnerability in the existing security system. For example:

ONCE THE PERIMETER HAS BEEN PENETRATED…

Physical penetration of a campus or building is frequently the first step in the attempt of malicious actors to gain access to an organization’s data.

Here are just a few of the many ways that criminals can cause damage, once they are inside the physical perimeter:

And the truth is that penetrating the perimeter does not necessarily require walking through the front door. If the CEO’s computer “happens” to be pointed in the direction of the window of a competing company, for example, that means there could be computers in the adjacent building that can record all of the CEO’s correspondence and steal his or her ideas.

BOTTOM LINE: PLAN, MONITOR, TEST, LEARN – REPEAT

Effective access control procedures combined with perimeter barriers and intrusion-detection devices are important to improving the effectiveness of any organization’s security. However, these aspects of security are not enough.

What’s necessary is a process of conducting pen tests and generating reports that show the weaknesses that were uncovered, then reviewing these reports and initiating an ongoing cycle of improvement – to ensure your organization’s data stays safe.

Check out our Cyber Hub to learn how you can stay one step ahead – making the most of security automation.