What physical security risks are created by an organization’s implementation of a PHYSBITS solution? What mitigations would you recommend to lesson them?
The physical security risks created by an organization’s implementation of PHYSBITS solution are (1) creation of lager attack surface: the integration of physical security with IT security gives attackers access to an organizations network; if the physical security is breached, an attacker who physically breaches a facility could have access to critical IT infrastructures and sensitive data. (2) Management: integrating the physical security to IT systems can create challenges in managing and maintaining security protocols across both physical and logical environments. (3) Configurations: human error could lead to improper configurations thereby creating more vulnerabilities that will be exploited by an attacker.
I will recommend network segmentation to mitigate the vulnerability of lager attack surface created by PHYSBITS implementation. Secondly, I will recommend a targeted training for staff on both physical and IT security to reduce the risk of human error. Lastly, I will recommend periodic assessment of PHYSBITS systems to identify and mitigate any vulnerability in the findings.
Nelson Ezeatuegwu says
The physical security risks created by an organization’s implementation of PHYSBITS solution are (1) creation of lager attack surface: the integration of physical security with IT security gives attackers access to an organizations network; if the physical security is breached, an attacker who physically breaches a facility could have access to critical IT infrastructures and sensitive data. (2) Management: integrating the physical security to IT systems can create challenges in managing and maintaining security protocols across both physical and logical environments. (3) Configurations: human error could lead to improper configurations thereby creating more vulnerabilities that will be exploited by an attacker.
I will recommend network segmentation to mitigate the vulnerability of lager attack surface created by PHYSBITS implementation. Secondly, I will recommend a targeted training for staff on both physical and IT security to reduce the risk of human error. Lastly, I will recommend periodic assessment of PHYSBITS systems to identify and mitigate any vulnerability in the findings.