Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

Physical Security

Assessment
Group 01 –CB010517
(Individual)
Approval to Conduct a
Physical Security
Assessment
Before conducting a physical security assessment the
lab team will request approval from the client
organization requesting any resources/corporation that
will be beneficial/required by the physical security
department while the assessment is being
conducted .Once the relevant stakeholders in the
company have granted the approval, the assessment
will commence.
Site Security
1 Study
Physical Security
Assessment Plan Site Security
2 Audit
The physical security assessment plan is a
step by step guideline for the physical
security department to follow when Risk
conducting physical secuirty assessments 3 Assessment
to apiit and other clients. The plan has 4
stages which are
Solution
4 Planning
Interview
1
stakeholders

Site Security Study


Performing walk
2 throughs
The site security study involves the
cyber lab extracting information from
client organization to get an Analyze assets and
understanding on the business
3 other resources
operations and the surroundings.
Examining site
4 blueprints
Site Security Audit 1 Perimeter
security
In the site secuirty audit phace various
mechanisms which enforce the physical Internal
security of the organizations will be
2 Organization security
reviewed for vulnerabilities and other
security flaws. Examples might be
implemented physical controls , access 3 Access Controls
control mechanisms etc. The audit will
generally take place in the given areas.
Environmental
4 Conditions
Risk Assessment
The risk assessment phase will rate the
vulnerabilities found in the site security audit
and will involve in identifying threats and
exploits that could be used for the above found
vulnerabilities . A severity score will also be
given to the assets if the asset becomes
unavailable
Solution
Planning

The solution planning phase will deliver the recommendations to


address the found vulnerabilities.

Some solutions are in the following ways

• Providing recommendations for Internal/Perimeter security.


• Awareness training for employees.
• Providing new Access control mechanisms
Thank You

You might also like