Domain 7 Β· Lesson 6 of 6
Physical Security Operations & Environmental
VαΊn hΓ nh BαΊ£o mαΊt VαΊt lΓ½ & MΓ΄i trΖ°α»ng
Physical Security Operations
Guards & Patrols
- Deterrence (visible presence) + detection (respond to incidents)
- Must have written procedures and patrol logs
- Guards are a human control β can be compromised (social engineering, bribery)
- Effectiveness depends on training and randomized patrol patterns
CCTV (Cameras)
- Must be RECORDED β not just live monitoring
- Retention: typically 30β90 days (varies by regulation)
- Recordings must be stored securely (tamper-evident, restricted access)
- Legal retention requirements: check local law (Philippines, Vietnam)
- Camera coverage: all entry/exit points, server rooms, loading docks
Access Logging
- Badge swipe records, biometric events
- Provides audit trail: who entered which area, when
- Audit access logs periodically β look for anomalies (access at 3am)
- Reconcile with HR records (terminated employees still showing access = major gap)
Visitor Management
- Sign-in required at reception β log name, ID, host, purpose, time in/out
- Escort required in ALL restricted/secure areas β no exceptions
- Visitor badge (different color from employee badge β visually distinguishable)
- Escort is responsible for visitor's actions in the secure area
Media Handling & Transport
Classified media transported in locked, tamper-evident containers. Chain of custody maintained. Upon receipt, verify container seal integrity before opening. Any transport of sensitive media requires documentation.
Fire Suppression Systems
CRITICAL: CO2 Suppression β EVACUATE FIRST
CO2 suppression displaces oxygen. It will extinguish people as effectively as it extinguishes fires. All personnel MUST evacuate before CO2 activation. This is the most commonly tested fire suppression fact on the CISSP exam.
| System | Activation Trigger | Human Safety | Equipment Safety |
|---|---|---|---|
| Pre-action | BOTH smoke AND heat detected (double-interlock) | Safe for people β human verification before discharge | Good β reduces accidental discharge risk |
| FM-200 (HFC-227ea) | Smoke / heat sensor | Safe for people at design concentrations | Excellent β clean agent, no residue |
| CO2 | Manual activation or smoke sensor | EVACUATE ALL PERSONNEL FIRST | Effective β but oxygen depletion is lethal to humans |
| Wet Pipe Sprinkler | Any single head heated above threshold | Safe for people (water) | Poor β water damages electronics; risk of accidental discharge |
Best for Data Centers
Pre-action or FM-200 (clean agent). FM-200 leaves no residue, safe for equipment and people. Pre-action prevents accidental water discharge. Both are preferred over wet pipe for server rooms.
CO2 β Industrial / Unoccupied Spaces
CO2 is effective and cheap but requires guaranteed evacuation before activation. Suitable for unoccupied areas (transformer rooms, generator rooms) where personnel protocols can be strictly enforced.
Environmental Monitoring
| Parameter | Alert Threshold | Risk if Exceeded |
|---|---|---|
| Temperature | Alert if >27Β°C in server room | HVAC failure β hardware failure β unplanned downtime |
| Humidity (low) | Alert if <40% | Static electricity risk β ESD damage to hardware |
| Humidity (high) | Alert if >60% | Condensation β moisture damage to electronics |
| Water leak | Any detection | HVAC/cooling leak under raised floor or near CRAC units |
| Power quality | UPS activation | Power failure β UPS provides 15β30 min battery backup β generator must start within this window |
UPS & Generator
UPS (battery) provides 15β30 minutes of power during outage β enough time for the diesel generator to start and stabilize. Generator fuel level must be maintained at all times. Fuel monitoring alerts if level drops below 25% threshold.
Raised Floor Benefits
Allows cold air distribution from below (CRAC units), cable management, and water leak detection sensors placed at floor level where water accumulates first. Water sensors under raised floor are essential in data centers.
Asset Disposal & Media Sanitization
| Media Type | Sanitization Method | Notes |
|---|---|---|
| HDD (magnetic) | Overwrite Γ3 (DoD 5220.22-M) or degauss | Degaussing destroys the drive β cannot be reused |
| SSD / Flash | Cryptographic erasure (encrypt then discard key) or physical shredding | Overwriting unreliable due to wear-leveling; physical shred is safest |
| Tape backup | Degauss or physical destruction | Degauss with certified equipment; physical shred for highly classified |
| Paper / Printed | Cross-cut shredding, not strip-cut | Strip-cut shredding can be reconstructed; cross-cut cannot |
Destruction Certificate
Paper evidence that media was properly sanitized or destroyed β required for audit compliance. Must include: asset tag, media type, serial number, sanitization method, date, technician name, and witness signature. This is your proof to auditors that data was properly disposed of.
Asset Tracking
Asset tag on all hardware. Quarterly reconciliation of physical assets against CMDB. Any unaccounted-for hardware = potential theft of data-bearing device. Equipment leaving the facility (repair, decommission) must be logged in chain of custody record.
Key Terms
- CO2 fire suppression: EVACUATE all personnel BEFORE activation. Oxygen displacement is lethal β this is the most frequently tested physical security question.
- Visitor escorts: required in ALL restricted/secure areas β no exceptions, no "trusted vendors" exemptions.
- Destruction certificate: required audit evidence that media was properly sanitized or destroyed. Without it, you cannot prove data was disposed of correctly.
- UPS provides minutes of power β generator must start BEFORE UPS battery depletes. UPS bridges the gap; generator is the sustained power source.
- CCTV two key requirements: (1) RECORDED (not just monitored live), and (2) stored securely with defined retention period (commonly 30β90 days).
- SSDs cannot be reliably overwritten β use cryptographic erasure or physical shredding. Overwriting HDDs multiple times is acceptable but overwriting SSDs is unreliable due to wear-leveling algorithms.
Shared responsibility for GCP: Google manages physical security of GCP data centers β guards, biometrics, CCTV, fire suppression, environmental monitoring. This is covered by GCP's compliance certifications (SOC 2, ISO 27001). FinTech Company X can request evidence of physical controls via GCP compliance reports.
Office physical security (Hanoi/Manila offices):
- Server room (if any): badge access + CCTV + visitor log. No tailgating policy.
- All engineer laptops: full-disk encryption required (FileVault for macOS, BitLocker for Windows). Lost laptop = no data breach if encrypted.
- Visitor policy: sign-in at reception, escort required in engineering areas, visitor badge different color from employee.
Media disposal: Any old hard drives from dev machines or replaced equipment β use physical shredding service with destruction certificate. Never donate or sell equipment without certified sanitization.
Partner E Manila co-location (planned): Negotiate physical security SLA with co-lo provider before signing: uptime guarantee, badge access logs provided to FinTech Company X, CCTV coverage of cabinet, environmental monitoring alerts forwarded to Datadog, and key management (who holds access keys to the cage).
Environmental monitoring for co-lo: Require the co-lo to send temperature/humidity/power alerts to FinTech Company X's Datadog. Do not rely solely on the co-lo provider's internal alerting β you need your own visibility.
Practice Quiz
Q1. A CO2 fire suppression system activates in a server room. What must happen BEFORE activation?
βΌ Reveal Answer
Q2. A vendor representative needs to access the server room to replace hardware. What is required?
βΌ Reveal Answer
Q3. Hard drives are being decommissioned from a fintech server. What is a destruction certificate and why is it required?
βΌ Reveal Answer
Q4. Power fails at the co-location facility. What is the role of UPS vs generator?
βΌ Reveal Answer
Q5. What are the two key operational requirements for CCTV in a secure facility?
βΌ Reveal Answer
Domain 7 Complete
You've finished Security Operations!
6 lessons covering incident response, digital forensics, monitoring, change management, BCP/DRP, and physical security. Domain 7 is 13% of the CISSP exam β these operational controls are where all other domains get tested in the real world.
Continue to Domain 8: Software Development Security β