Physical Office Security Services

Physical Office Security Services

The Importance of Physical Office Security
“If a bad guy has unrestricted physical access to your computer it’s not your computer anymore.”

– from Microsoft’s “Immutable Laws of Security”

Today’s cybersecurity firms often advertise state-of-the-art intrusion detection technologies, such as next generation firewalls, and they often talk about encryption services, database hardening, etc.  But just as often they forget to emphasize the equally-critical physical security domain.

At NES our security professionals are certified in physical (environmental) security and understand that without adequate physical protections, the technical and administrative aspects of your office’s security program can easily be bypassed.

NES Physical Security Services
Our physical security services can be customized to meet the budgetary and operational priorities of your organization, and include the following:

Policy Evaluation & Design

  • Evaluation of current policies against recognized security frameworks
  • Policy creation and integration
  • Periodic (quarterly) policy updates to match developing regulatory compliance developments

Physical Security Evaluation & Design

  • Perimeter security
    • Facility access controls
    • Locks
    • Fencing
    • Bollards / blockades
    • Points of entry and egress
    • Walls, floors, ceilings, doors, windows
  • Internal compartmentalization
  • Security of computer and equipment rooms
  • Communication paths and types (e.g. telephonic, fiber)
  • External factors:
    • Proximity to key outlets and modes of transportation (e.g. highways, airports)
    • Electromagnetic interference
    • Climate
    • Vehicle activity
    • Neighboring structures and businesses
  • Power distribution systems
  • Construction (HVAC, water & gas, lighting)
  • Fire detection and suppression

Asset Inventory & Management

  • Asset inventories and registration
  • Configuration management
  • Procedures for mobile asset management (e.g. mobile phones, tablets)
  • Hardening of operating systems
  • Hardening of data centers and data bases
  • Data encryption

Risk Analysis

  • Identification of Vulnerabilities
  • Threat identification
    • E.g. Insider threat analysis
  • Operational Impact Analysis
    • Breach analysis
  • Response planning

Situational Assessments & Simulations

  • Design of physical security procedures
    • Damage assessment criteria
    • Damage assessment procedures
  • Simulated physical breach

Intrusion Detection

  • Sensors
  • Cameras
    • CCTVs
    • Area classification and zoning
  • Badging systems