keys to a more successful physical security program

44
INTRODUCTION

Upload: energysec

Post on 10-Feb-2015

1.628 views

Category:

Technology


0 download

DESCRIPTION

An effective security program is a living thing.  It is comprised of a myriad of equipment, actions, policies, and procedures all of which interconnect and rely on each other in order to provide a comprehensive and effective program.    The collection of documents, together forming the security program, must be, by design and intent, focused on three primary missions: remedial measures, preventative measures, and, overlapping both of these, education.  The security plan must accurately describe situations both present and future; capture potential scenarios and consequences; detail the organization’s actions both during and following specific events; and, educate the organization on the specific roles specific groups play. Joachim Gloschat's presentation will address all this and more as he explores what makes a successful physical program security.

TRANSCRIPT

Page 1: Keys to a More Successful Physical Security Program

INTRODUCTION

Page 2: Keys to a More Successful Physical Security Program

Background

US ArmyRussian Cryptography Interceptor

○1984 to 1987Mandarin Chinese Intelligence Officer

○1989 to 2001

Page 3: Keys to a More Successful Physical Security Program

Sept 11, 2001World Trade Centers

Page 4: Keys to a More Successful Physical Security Program

“Working in security is doing God’s work as far as I am concerned. Security work is an opportunity to serve fellow man…There is

nothing greater than saving lives.”

Dr. Ona Ekhomu, CPP Security Management Magazine, March 2007 First Nigerian ASIS

Certified Protection Professional

Page 5: Keys to a More Successful Physical Security Program

Background Antiterrorism/Force Protection

2001 – US Corps of Engineers2002 – Operation Enduring Freedom2003 – Operation Iraqi Freedom2004 – Security Management Solutions

○ Federal Energy Regulatory Commission○ Association of State Dam Safety Officials○ InterAgency Forum for Infrastructure

Protection

Page 6: Keys to a More Successful Physical Security Program

Post 9/11

Page 7: Keys to a More Successful Physical Security Program

A Paradigm Shift

Page 8: Keys to a More Successful Physical Security Program

Threat Dimensions1. Non-linear/Asymmetrical

2. Off-the-shelf technology

3. WMD and mass casualties Low Tech vs. High Tech

Urban vs. Rural fights

4. Urban fights

5. Avoid decisive battle

W. Foos, SMS

Page 9: Keys to a More Successful Physical Security Program

April 19, 1995 Murrah Federal

BuildingAug 7, 1998

US Embassy NairobiSept 11, 2001

World Trade Centers

Physical Attacks

Page 10: Keys to a More Successful Physical Security Program

11 March 2004 Madrid Train Bombings:

Spain

Physical AttacksSept 2004

Chechnya Rebels

Page 11: Keys to a More Successful Physical Security Program

Cyber Attacks

2003-2007 - TITAN RAIN 2006-present - SHADY RAT 2008- DOD Classified and Unclassified

Systems-Contaminated thumb drive 2010 - STUXNET 2011 - 50 DAYS OF LULZ

Page 12: Keys to a More Successful Physical Security Program

Cyber Attacks 2012

13.37 million recorded compromised 189 total breaches

NY Electric and Gas 1.8m Global Payments 1.5m CA Dept. of Child Support 800k Utah Dept. of Technical Services 780k

Page 13: Keys to a More Successful Physical Security Program

W. Foos, SMS

Page 14: Keys to a More Successful Physical Security Program

MAKING A SECURITY

PROGRAM MORE EFFECTIVE

Page 15: Keys to a More Successful Physical Security Program

Why is a Security Program so vital?

Page 16: Keys to a More Successful Physical Security Program

How does a Security Program Work?

A Security Program protects assets or facilities against:

1. Theft

2. Sabotage

3. Malevolent human attacks

4. Natural Events

Page 17: Keys to a More Successful Physical Security Program

What does a Security Program Encompass?

1. Physical Security

2. Cyber Security

3. Personnel Security

4. Information Security

5. Business Continuity

6. Crisis Management

Page 18: Keys to a More Successful Physical Security Program

PreventionRemediation

Education

Remediation1. Upgrading PPS

2. Upgrading Security Program

3. Responding to Incidents

4. Implementing Risk Reduction Recommendations

Education1. R&D

2. SOPs

3. Emergency Response Plan

4. Physical Security Plans

5. Define, Establish, & Update HLS security procedures

6. Guard Contracts

Prevention1. Maintenance of Systems

2. Assessment – Evaluations

3. SOP Development

4. Integration of Security Operations

5. Training & Exercise of EAPs

6. Implementation of Heightened Security Procedures

Security Documents:-Threat Assessments

- Vulnerability Study

Three Components of a Security Program

W. Foos, SMS

Page 19: Keys to a More Successful Physical Security Program

An Effective Security Program ties it all together.

Fundamentals of Security Integration

People

Policies

EquipmentProcedures

Page 20: Keys to a More Successful Physical Security Program

Security Program Measures

1. Preventative measures – Reduce the likelihood of an attack, delay the success of the attack, protect the assets or make it less vulnerable of being compromised.

2. Detective measures – Discover the attack and activate corrective or mitigative action.

3. Corrective measures – Reduce the effects of an attack and restore to normal operations.

W. Foos, SMS

Page 21: Keys to a More Successful Physical Security Program

What are The Steps Necessary?

1. Evaluate

2. Establish

3. Sustain

Page 22: Keys to a More Successful Physical Security Program

Step One: Evaluation

1. Mission

2. Assets

3. Consequences

4. Threats

5. Security System Effectiveness

Page 23: Keys to a More Successful Physical Security Program

Step One: Evaluation (Mission)

1. What do I buy?

2. What do I sell?

3. How do I produce it?

4. What components do I need to make what I make?

5. What does it take to get those components and deliver the finished product?

Page 24: Keys to a More Successful Physical Security Program

Company Mission Company Vision License Requirements Shareholder Mandates Products of the facility Vendors Inventory System Shipping and Receiving Operational involvement & location of

senior executives

How Missions lead to Assets

W. Foos, SMS

Page 25: Keys to a More Successful Physical Security Program

1. Physical

2. People

3. Knowledge

4. Information Technology

5. Clientele

6. Any activity that has a positive value to its owner

Step One: Evaluation (Assets)

Page 26: Keys to a More Successful Physical Security Program

What would it take to disrupt operations?

What would it take to stop operations? What would happen to the vendors, your

company, your customers, if operations paused or ceased?

Who and What would be impacted?

Step One: Evaluation (Consequences)

Page 27: Keys to a More Successful Physical Security Program

The Security Program Arch

THREAT

INFOSEC

PH

YS

EC

CY

BE

RS

EC

PERSEC

Step One: Evaluation (Threat)

Page 28: Keys to a More Successful Physical Security Program

Natural

Intentional

Unintentional

Step One: Evaluation (Threat)

Page 29: Keys to a More Successful Physical Security Program

W. Foos, SMS

Page 30: Keys to a More Successful Physical Security Program

Threat Categories

Terrorists (CONUS or OCONUS)EcologicalMilitia / ParamilitaryRogueRacist

Extremist Group Vandals

Saboteurs Criminals Cyber Threat Gangs Other Insider(s)

RAMTM

Page 31: Keys to a More Successful Physical Security Program

UNDERSTANDING THE DESIGN BASIS

THREAT

Page 32: Keys to a More Successful Physical Security Program

Identifying the Design Basis Threat

Motivation Capability History and Behavior

Patterns Current Activity Geographic Access Organization &

Numbers Mobility Technology/ Tactics

RAMTM

Page 33: Keys to a More Successful Physical Security Program

Design Basis Threat (Example)

Adversary Type Militia/Paramilitary Terrorist Group

Motivation Ideological/Political/Publicity

Group Terrorist Cell - 2 to 7 persons – well organized

Tactics Large scale sabotage

Equipment Hand tools, construction equipment, 2-way radios

Weapons Small handguns, rifles, submachine guns

Explosives Vegan Jell-O, TNT or Equivalent Explosives

Transportation Sport utility vehicles, all-terrain vehicles, vans, 4x4s, foot access

Intelligence gathering means

Surveillance, Internet research, public record review

Technical skills and knowledge

Sophisticated technical education

Financial resources Assumed unlimited

Potential for collusion Disgruntled or planted employee or contractor

RAMTM

Page 34: Keys to a More Successful Physical Security Program

Intelligence Methods used by Adversaries

Open Source Research FOIA Internet Public Domain Technical

Reports People Informers Intelligence Agents Communications Photographs / Surveillance Trash

W. Foos, SMS

Page 35: Keys to a More Successful Physical Security Program

Based on analysis of Asset and Threats, create Asset-Threat Pairing

Not every Asset is considered attractive to the same Threat

Every asset’s protection must be evaluated against its own Design Basis Threat

Step One: Evaluation (Security System Effectiveness)

Page 36: Keys to a More Successful Physical Security Program

Basics of Security

1. Detect

2. Assess

3. Delay

4. Respond

5. Integration and Communication

Page 37: Keys to a More Successful Physical Security Program

Fundamentals of SecurityProtection in Depth & Balanced

Protection

OAsset

Outer Perimeter

Intermediate Perimeter

Inner Perimeter

Exclusion Zone

Page 38: Keys to a More Successful Physical Security Program

What are The Steps Necessary?

1. Evaluate

2. Establish

3. Sustain

Page 39: Keys to a More Successful Physical Security Program

Step Two: Establish

1. Fill in the gaps

2. Create what wasn’t there

3. Accept versus Reject Risk

4. Risk Reduction Measures

Page 40: Keys to a More Successful Physical Security Program

PreventionRemediation

Education

Remediation1. Upgrading PPS

2. Upgrading Security Program

3. Responding to Incidents

4. Implementing Risk Reduction Recommendations

Education1. R&D

2. SOPs

3. Emergency Response Plan

4. Physical Security Plans

5. Define, Establish, & Update HLS security procedures

6. Guard Contracts

Prevention1. Maintenance of Systems

2. Assessment – Evaluations

3. SOP Development

4. Integration of Security Operations

5. Training & Exercise of EAPs

6. Implementation of Heightened Security Procedures

Security Documents:-Threat Assessments

- Vulnerability Study

Three Components of a Security Program

W. Foos, SMS

Page 41: Keys to a More Successful Physical Security Program

Security Policies and Procedures

Establish strategic security objectives and priorities for

organization

Identify personnel responsible for security functions

Identify the employee responsibilities Should be aligned with the objectives of the

organization

Should cover the following topics

- People - Property - Information

Page 42: Keys to a More Successful Physical Security Program

What are The Steps Necessary?

1. Evaluate

2. Establish

3. Sustain

Page 43: Keys to a More Successful Physical Security Program

Step Three: Sustain

1. Education

2. Exercises

3. Relationships

4. Reevaluation

Page 44: Keys to a More Successful Physical Security Program