Physical security assessment

Our physical security assessment ensures that your organisation’s security measures are effective in preventing physical breaches.

How does our physical security assessment work?

Working towards your organisation’s goals, our consultants simulate a malicious threat actor attempting to breach the building and access sensitive areas like the server room. This is done using various techniques based on your current security procedures.

Scoping and planning

Define objectives

Cognisys will work closely with you to understand your organisation’s operations and further information required to deliver this work. The goal is to understand the goals and objectives needed for the consultants to meet for this engagement. These goals and objectives typically start with gaining entry onto the site and end with physical access to critical infrastructure, such as entry to server rooms.

Requirements

You must provide the addresses for the sites that need testing, along with the contact details for the point of contact. A ‘get out of jail free’ card will be required for the assessments, which can be provided to staff when confronted. This would be used primarily to prove the consultant’s identity, grant us permission to be in the facility, and have the point of contact’s information.

Reconnaissance

This phase of the engagement involves the consultant performing OSINT to gather relevant information required for the assessment. This involves things such as scraping online resources to find the design for ID badges your organisation uses to craft a valid reason for being onsite. A visit to the site to scope out the environment may be required if limited information is available online. This includes finding unlocked areas of the premises and reviewing weakened and degraded doors/walls.

Attempt

On the assessment day, the consultant will attempt to gain access to the site through multiple techniques. Initial access from previous engagements has been achieved in various ways, ranging from tailgating an employee to impersonating a third-party contractor or employee. It should be noted that this is primarily done through social engineering attacks, with destructive entry being out-of-scope.

Guided walkthrough

If the consultant cannot access the site, a guided walkthrough of the assessment in a white-box setting would be requested. This allows the consultant to gather potential weaknesses, such as sensitive documents being left around or a lack of CCTV on the critical infrastructure that would have been missed on the initial entry attempts. This helps to ensure that if your organisation’s security posture is strong enough to prevent access to the site, there will be places to help further harden the premises if initial entry is possible.

Reporting

After the engagement, it’s essential to analyse the results, regardless of the findings. In a controlled physical assessment, the focus is on assessing the site’s security. Focusing on every aspect that could be used to help gain access to sensitive information onsite. The report would detail the entire walkthrough for all entry attempts, along with reporting on the security recommendations to help further harden the building.

Why choose Cognisys’ physical security assessment?

Tailored assessments: Our testers are experienced in constructing and creating effective physical security assessment campaigns. This allows the consultant to develop a bespoke campaign unique to the client’s site, increasing the likelihood of performing a successful breach.

Full reporting and remediation advice: Post-assessment, we deliver detailed reports highlighting the findings from the physical security assessment campaign, such as a full breakdown of each break-in attempt and all findings from reconnaissance and test performance.

FAQs

Typically, anything destructive is out-of-scope. This includes lockpicking due to the risk of a pick breaking inside the lock. The consultants will not perform actions which put others in danger. Illegal or harmful actions, such as theft or vandalism, are strictly prohibited.

Cognisys requires the organisation to provide a ‘get out of jail free’ card containing the point of contact’s personal information and a short paragraph explaining that the consultants are onsite to perform a security assessment. Alongside this, the full address of the site(s) is required.

Ideally, very few people in the organisation should know this is ongoing. If the employees are expecting a social engineering attack to take place, it doesn’t capture a realistic response to the engagement if staff are expecting a strange visitor.

If a consultant cannot enter the site for a physical assessment, the consultant will liaise with the point of contact to review their current options. This typically results in a white-box, guided site tour to perform the audit.

These assessments help uncover weaknesses in access controls, employee awareness, and response protocols, enabling organisations to implement adequate safeguards and training. By proactively testing their defences, organisations can better protect their assets, sensitive information, and personnel from potential threats and breaches.

Let’s make things happen

Fill in the form and one of our team will be in touch for a no-obligation discussion or quote regarding your requirements.

info@cognisys.co.uk
Leeds office

5 Park Place
Leeds
LS1 2RU

info@cognisys.co.uk
London office

131 Finsbury Pavement
London
EC2A 1NT

CONTACT OUR TEAM

RECENT UPDATES

Deltia.ai shows commitment to security with ISO 27001

CASE STUDY

Deltia.ai shows commitment to security with ISO 27001

Learn how Deltia.ai, an AI-driven manufacturing solutions provider, protected their data and customers with ISO 27001.

The biggest cyber attacks and vulnerabilities from October 2024

NEWS

The biggest cyber attacks and vulnerabilities from October 2024

Insights and trends from recent cyber threats and vulnerabilities from October.

Top 10 best practices for API security

BLOG

Top 10 best practices for API security

Learn why API security is more important than ever and how strategies like encryption, input validation, and Zero Trust can help protect your data.