Physical Security Assessment

In today’s environment, assessment of the physical security of an organization’s assets has become an even more critical aspect of an organization’s information security and business continuity planning.

ISecurion addresses this requirement by engaging skilled security professionals equipped to identify critical aspects of physical security that impact an organization’s computing environment.

  • Helps organizations access their preparedness against Physical attacks.
  • Identifies existing vulnerabilities and control gaps related to physical security.
  • Enhances existing policies, processes and standards and match them against Industry best practices.
  • Assurance to client and business partners that your physical site is secure.

As part of our assessment we conduct a thorough review of the physical infrastructure and identify the key processes. This helps us to gain an insight into the people and technology that are part of this system and their key responsibilities. Our methodology for security Assessment is based on is based on the following approach

Facility security

  • Entry points and exit points.
  • Data center and Power control rooms.
  • User and sensitive environments
  • Access control and monitoring devices
  • Security guards
  • Wiring closets

Internal company personnel

  • Control and accountability
  • Use and maintenance of equipment
  • Security procedure compliance
  • Awareness and Training Programs
  • Use of break areas and entry points

External visitor and contractor personnel

  • Control and accountability
  • Use and maintenance of equipment
  • Security procedure compliance

Computer systems and equipment

  • Workstations and Servers
  • Backup establishments
  • Computer systems and equipment
  • Modems and physical access points (visual ID only)

Sensitive information and data

  • Control
  • Storage
  • Destruction

Our assessment includes methods as social engineering, lock picking, RFID cloning, piggy banking, security systems bypass, device or Trojan planting, and other methods based on customer requirements.