Physical & Logical Security Measures
Key Takeaways
- Physical security measures include cable locks, server room access controls (badge readers, biometrics), security cameras, mantraps/vestibules, and bollards — physical access to a device often means full compromise.
- Multi-factor authentication (MFA) uses two or more factors: something you know (password), something you have (smart card, phone), something you are (biometrics), and somewhere you are (location).
- The principle of least privilege means users should only have the minimum permissions necessary to perform their job — excessive permissions increase risk.
- Access control lists (ACLs) define which users or groups can access specific resources and what level of access they have (read, write, execute, full control).
- Strong password policies require minimum length (12+ characters recommended), complexity (uppercase, lowercase, numbers, symbols), expiration intervals, and account lockout after failed attempts.
Physical & Logical Security Measures
Physical Security
Physical security prevents unauthorized access to hardware and infrastructure:
| Control | Description |
|---|---|
| Cable Locks | Kensington lock attaching laptop/equipment to a desk |
| Badge/Card Reader | Proximity or smart card reader for door access |
| Biometric Locks | Fingerprint, iris, or facial recognition for high-security areas |
| Mantrap / Security Vestibule | Two-door entry system — only one door open at a time (prevents tailgating) |
| Security Cameras (CCTV) | Surveillance recording and deterrence |
| Motion Sensors | Detect movement in restricted areas |
| Bollards | Physical barriers preventing vehicle access to buildings |
| Fencing | Perimeter security around facilities |
| Signage | Warning signs for restricted areas, no trespassing |
| Locks | Traditional key locks, combination locks, electronic locks |
| Lighting | Adequate lighting deters intruders and aids camera surveillance |
| Guards | Security personnel for access control and incident response |
| Alarm Systems | Alert security when unauthorized access is detected |
Server Room Security
- Access should be restricted to authorized IT personnel only
- Use electronic access control (badge + PIN or biometric)
- Maintain access logs for auditing
- Environmental controls: temperature monitoring, fire suppression, humidity control
- Surveillance cameras pointed at entrances and equipment racks
Authentication Factors
Multi-factor authentication (MFA) combines two or more of the following factor categories:
| Factor | Category | Examples |
|---|---|---|
| Something you know | Knowledge | Password, PIN, security questions |
| Something you have | Possession | Smart card, security token, phone (SMS/app), USB key |
| Something you are | Inherence (Biometric) | Fingerprint, iris scan, facial recognition, voice |
| Somewhere you are | Location | GPS location, IP address geolocation |
Key Distinction: Using a password + a PIN is NOT multi-factor authentication because both are "something you know." True MFA requires factors from different categories (e.g., password + fingerprint, or password + phone app code).
Common MFA Implementations
- SMS code — One-time code sent to phone (least secure MFA — vulnerable to SIM swapping)
- Authenticator app — Time-based one-time password (TOTP) from apps like Google Authenticator or Microsoft Authenticator
- Hardware token — Physical device that generates codes (YubiKey, RSA SecurID)
- Push notification — Approve/deny prompt on phone
- Biometric — Fingerprint or facial recognition
Access Control Principles
Principle of Least Privilege
- Users receive only the minimum permissions needed to perform their job
- Reduces risk if an account is compromised
- Example: A marketing employee should not have access to financial databases
Role-Based Access Control (RBAC)
- Permissions are assigned to roles, not individual users
- Users are assigned to roles based on their job function
- Example roles: Admin, Manager, Employee, Contractor, Guest
NTFS Permissions (Windows)
| Permission | Capability |
|---|---|
| Full Control | Read, write, modify, delete, change permissions |
| Modify | Read, write, delete files and subfolders |
| Read & Execute | View files and run programs |
| List Folder Contents | View folder contents |
| Read | View file contents |
| Write | Create files and write data |
Permission Inheritance: Permissions assigned to a parent folder are inherited by all subfolders and files unless explicitly blocked.
Share Permissions vs. NTFS Permissions
| Feature | Share Permissions | NTFS Permissions |
|---|---|---|
| Applies to | Network access only | Local AND network access |
| Granularity | Read, Change, Full Control | 6 levels (see above) |
| When both apply | Most restrictive permission wins | Most restrictive permission wins |
Password Policies
| Policy | Recommended Setting |
|---|---|
| Minimum Length | 12+ characters |
| Complexity | Uppercase, lowercase, numbers, special characters |
| Maximum Age | 90 days (or use passphrase with no expiration) |
| Minimum Age | 1 day (prevents immediate cycling) |
| History | Remember last 12–24 passwords |
| Account Lockout | Lock after 5 failed attempts |
| Lockout Duration | 15–30 minutes (or until admin unlocks) |
User Account Types
| Account Type | Permissions | Use Case |
|---|---|---|
| Administrator | Full system control | System administration (use sparingly) |
| Standard User | Run programs, modify own files only | Daily use (recommended default) |
| Guest | Very limited, temporary access | Visitor access (disable when not needed) |
| Power User | Between Admin and Standard (legacy) | Legacy applications needing elevated access |
| Service Account | Runs background services | Database, web server, backup services |
A user logs in with a password and then scans their fingerprint. What type of security is this?
What is a mantrap (security vestibule) designed to prevent?
According to the principle of least privilege, a new marketing employee should: