CIP-006: Cyber Security Illustrative Approach

While this standard emphasizes requirements for establishing a Physical Security Perimeter within a “six-wall” border, it also allows for alternative measures to control physical access to cyber assets that do not reside within such a border. In today’s distributed network environment, cyber assets are increasingly likely to exist outside the “six-wall” border. In addressing alternative measures to establish physical security practices outside the “six-wall” border, responsible entities should define physical security zones and implement appropriate preventive and detective controls in each zone to protect against the risks of:

  • Physical penetration by malicious or unauthorized people,
  • Damage from environmental contaminants, and
  • Electronic penetration through active or passive electronic emissions.

Risk-based Security Zones – Zones are physical areas with differing physical security requirements. The security requirements of each zone are a function of the sensitivity of the data contained or accessible through the zone and the information technology components in the zone. For instance, data centers that would typically reside within a “six-wall” border may be in the highest security zone. Staff offices may be in a much lower security zone. Different security zones can exist within the same structure. Routers and servers in an office, for instance, may be protected to a greater degree than password protected dumb terminals. Computers and telecommunications equipment within an operations center will have a higher security zone than input or output operations, with the media used by that equipment stored at an even higher zone.

The requirements for each zone should be determined through the risk assessment. The risk assessment should include, but not be limited to, the following threats:

  • Aircraft crashes
  • Chemical effects
  • Dust
  • Electrical supply interference
  • Electromagnetic radiation
  • Explosives
  • Fire
  • Smoke
  • Theft/Destruction
  • Vibration/Earthquake
  • Water
  • Criminals
  • Terrorism
  • Political issues (e.g. strikes, disruptions)
  • Any other threats applicable based on the entity’s unique geographical location, building configuration, neighboring entities, etc.

Alternative Measures – Alternative physical security measures are needed where cyber assets such as hardware and software exist in a distributed IT environment, e.g., in a user department that may be less secure than a “six-wall” location such as a data center or a computer room. Distributed hardware and software environments (e.g., local area networks or LANs) that offer a full range of applications are commonly housed throughout the organization. In such situations, physical security precautions are often less sophisticated than those found in large data centers, and overall building security becomes more important. Internal control procedures are necessary for all hardware and software deployed in distributed, and less secure, environments.

The level of security surrounding any hardware and software should depend on the sensitivity of the data that can be accessed, the significance of applications processed, the cost of the equipment, and the availability of backup equipment. For example, because of their portability and location in distributed environments, personal computers (PCs) and other portable devices such as laptops often are prime targets for theft and misuse. The location of these portable devices and the sensitivity of the data and systems they access determine the extent of physical security required. For example, entities should consider securing PCs to workstations, locking or removing disk drives and unnecessary physical ports, and using screensaver passwords or automatic timeouts. Employees also should have only the access to PCs and data they need to perform their job. The sensitivity of the data processed or accessed by the computer usually dictates the level of control required. The effectiveness of security measures depends on employee awareness and enforcement of these controls.

Physical security for distributed IT, particularly LANs that are usually PC-based, is slightly different than for mainframe platforms. With a network there is often no centralized computer room. In addition, a network often extends beyond the local premises. There are certain components that need physical security. These include the hardware devices and the software and data that may be stored on the file servers, PCs, or removable media (tapes and disks). As with more secure IT environments, physical network security should prevent unauthorized personnel from accessing LAN devices or the transmission of data. In the case of wire-transfer clients, more extensive physical security is required.

An advantage of PCs is that they can operate in an office environment, providing flexible and informal operations. However, as with larger systems, PCs and other portable devices are sensitive to environmental factors such as smoke, dust, heat, humidity, food particles, and liquids. Because they are not usually located within a secure area, policies should be adapted to provide protection from ordinary contaminants. Other environmental problems to guard against include electrical power surges and static electricity.

The electrical power supply in an office environment is sufficient for PC requirements. However, periodic fluctuations in power (surges) can cause equipment damage or loss of data. PCs in environments that generate static electricity are susceptible to static electrical discharges that can cause damage to PC components or memory.

Network wiring also requires some form of protection because the data it carries can be revealed or contaminated even with slight physical contact with the wiring. Examples of controls include using a conduit to encase the wiring, avoiding routing through publicly accessible areas, and avoiding routing networking cables in close proximity to power cables. The type of wiring can also provide a degree of protection; signals over fiber cables, for instance, are less susceptible to interception than signals over copper cable.

Network security also can be compromised through the capture of radio frequency emissions. Frequency emissions are of two types, intentional and unintentional. Intentional emissions are broadcast, for instance, by a wireless network. Unintentional emissions are the normally occurring radiation from monitors, keyboards, disk drives, and other devices. Shielding is a primary control over emissions. The goal of shielding is to confine a signal to a defined area. An example of shielding is the use of foil-backed wallboard and window treatments. Once a signal is confined to a defined area, additional controls can be implemented in that area to further minimize the risk that the signal will be intercepted or changed.

Physical security devices frequently need preventive maintenance to function properly.

Maintenance logs are one control the entity can use to determine whether the devices are appropriately maintained. Periodic testing of the devices provides assurance that they are operating correctly.

Security guards should be properly instructed about their duties. The employees who access secured areas should have proper identification and authorization to enter the area. All visitors should sign in and wear proper IDs so that they can be identified easily. Security guards should be trained to restrict the removal of assets from the premises and to record the identity of anyone removing assets. Consideration should be given to implementing a specific and formal authorization process for the removal of hardware and software from premises.