Physical and operations security controls
Security controls that pertain to physical and operations are predominantly in the authentication and authorization processes. Unauthorized intrusions are a common threat in this domain. The following sections provide some of the common security threats, vulnerabilities, and countermeasures in this domain.
Threats, vulnerabilities, and countermeasures for physical and operations security
We have seen the concept of threats and vulnerabilities in various security domains in the earlier chapters. Though the threats are predominantly common across most of the security domains, the vulnerabilities they could exploit will vary, and the countermeasures are generally unique. Some of the threats and vulnerabilities that could exploit the infrastructure (infrastructure includes IT infrastructure as well) and its associated components are listed here.
Common threats
Some of the common threats to physical environment are as follows:
- Theft
- Heat and temperature
- Humidity...