Time
10 hours 28 minutes
Difficulty
Advanced
CEU/CPE
15

Video Description

This unit discusses enterprise security assessments. Security assessments can be used in a wide range of environments to satisfy a wide range of needs. When assessing security, start with policy and look at the directives coming from senior management within a company. Then, see if the goals of policy can be accomplished.

Video Transcription

00:04
Okay, So what would one of these enterprise security assessments look like? What are the things we're going to discuss? Well, what we're doing is we're figuring out, you know, we could use this for a gap analysis. Perhaps maybe we know where we wanna be. We want to examine where we are and figure out how to close that gap.
00:20
It might be something that we do is part of continuous Reines reassessment of our network environment.
00:26
It might be something that we've implemented. New security solutions. We want to figure out how they're coming together. So ultimately we can use thes security assessments in a wide range of environments are to satisfy a wide range of needs. Might be better way to say it.
00:41
So where do we start? We always start with policy. What is our policy Say? What are the objectives of our policy? What are we trying to accomplish? Ah, what is our policy look like? How's it framed? What are the procedures and the guidelines? Basically,
00:55
these were the directives from senior management. So we want to make sure that we understand policy we owns understand the purpose of policy, the directives of policy
01:03
And then what we want to do is we wanna take a look around and see if the controls that we have in place, you're gonna help us accomplish the goals of policy.
01:12
Start with a physical security assessment. You know, physical security really is your first line of defense against the bad guys, so to speak. And I realized that not everybody has to be on your physical premises to create an attack or to launch an attack. But our physical security is an important first step. So,
01:30
you know, is are the physical security
01:33
elements of our organization Are they complete and comprehensive? Or if I put all my security controls at the front entryway and then if you drive around back, I've got a loading dock Who's door's always open, you know? Is it comprehensive? Been complete. Don't forget also that as important as the physical security of our assets are,
01:52
we want to make sure that our physical controls
01:55
will always be designed first and foremost to protect human life. Is our facility well lit? Do we have unobstructed evacuation routes? You know, these air important considerations?
02:09
Um, do we have mechanisms in place that would help people evacuate the building in the event of a fire.
02:16
Ah, flood. Do we keep our people safe? Lights outside fences around the perimeters to keep intruders out? Not just intruders, not just keeping intruders out because they can steal our stuff, but also because they can pose a threat to the well being of our employees. Look at your physical security requirements
02:36
and see if those needs are being met.
02:38
Do we allow swipe card access to our building? Do we require that? If so, are people allowing other folks in on their card swipes? We call that piggy backing, and I have to tell you, if there is any security violation, I see almost every single place I go. It's piggyback
02:54
almost always and honestly, I can think of a handful of times. I've seen someone turn around and not let a stranger in behind them. Ah, and in those handful of times that I've seen it, it wasn't necessarily even handled particularly well.
03:12
So there's someone who's trying to follow me in on my card. Swipe.
03:15
Uh, you know what? I've seen people turn around and do and say, I can't let you in. I'm sorry you have to have a badge to get in here
03:23
and it first. And don't get me wrong. That's certainly better than nothing. But what have I just done? I have essentially said. Listen, you stand here. I'm not gonna let you in. Give it five minutes. Somebody else will. And I can just about assure you when you leave somebody out there that was attempting to get in your building,
03:42
they won't have to wait more than five minutes. Somebody let him in.
03:45
What should we have done instead?
03:47
Oh, I see You don't have your badge with you. Let me walk you down to security and they'll make sure that you have access to exactly where you need to go. I don't want you to be stuck here all day trying to get in. Come on with me.
03:58
What I've really said is, Hey, I don't know you. You're trying to get my building that earns you a free trip to security. But I've said it politely and in such a way that I'm being helpful, right? I'm not offending anybody. We've got to train our people. Not just don't let people in on your card swipe,
04:15
but what to do in case somebody tries.
04:17
Most people aren't current comfortable turning around, grabbing the door, enclosing it in somebody's face. They shouldn't have to be. That's not an appropriate response anyway. Immediately when somebody's trying to access your building without proper credentials taken to security, that security's problem now do it in a friendly, helpful manner. But ultimately,
04:38
if that was an attacker,
04:40
they're not gonna be able to just stay in there and try and try and try again. You take this person to security, and that's the third time they've been brought to security. That week. I can guarantee you that gets escalated. But if we just let that person stay out there and keep trying, somebody let him in.
04:55
Hey, so when we're assessing the physical controls of our building, not only are we assessing that we have the controls in place, but that people are are using them well as they were intended to be. Swipe card access does nothing for a business if your employees air going, allow other folks to piggyback behind them. Okay,
05:14
so we look at the physical security assessments.
05:15
Environmental security also comes under this category. Things as basic as temperature and humidity. Remember the three tenets of security, confidentiality, integrity and availability.
05:29
You show me an 85 degree server room, you will have a problem with availability. So we want to do those types of assessments as well. Look at our environmental controls and see how they're working out.
05:40
Okay.
05:41
All right. So once we're satisfied that the physical security of the building is sufficient and again it's driven by cost benefit analysis, Um, we'll move forward and talk about some of the more technical elements on the inside.

Up Next

CompTIA CASP

In our online CompTIA CASP training, you will learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor