Risk Mitigation: Securing the Stack
Introduction
Listed within this appendix is a layer-by-layer list of system security information that is useful when analyzing security and exploring ways to reduce vulnerabilities.
Physical
The check list shown in Table A.1 contains some common physical layer issues that can be reviewed to help measure overall physical security. While not all inclusive, it offers a good starting point.
Table A.1
Common Physical Layer Issues
Issue | Finding |
Is there perimeter security? | Yes |
No | |
If fence is present, what height is it? | 2–3 feet |
4–5 feet | |
6 feet or taller | |
Is exterior lighting adequate to deter intruders? | Yes |
No | |
Is CCTV being used? | Yes |
No | |
Are exterior doors secured? | Yes |
No | |
Is access control being used at building entries? | Access card ... |
Get Hack the Stack now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.