CHAPTER 21: PHYSICAL AND ENVIRONMENTAL SECURITY

As mentioned in Chapter 3, even in a cyber security project or programme, physical security cannot be totally ignored. For a start, the hardware on which your digital information is stored needs to be physically secured – encrypting your devices is of limited use when someone could easily just walk in and take them. Network segmentation and segregation also have limited effect if you do not secure your server room. In short, you cannot be both cyber secure and physically insecure.

Defining a secure perimeter

First, you need to define your physical perimeter: the physical boundaries around your physical assets – including your workplace, hard-copy information, hardware and people – that need to be ...

Get Cyber resilience - Defence-in-depth principles now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.