Physical Security Assessment Service

We assess your facilities physical security and access control mechanisms
Blue Goat did an assessment on our data center and found several areas for us to improve, including perimeter access control, CCTV coverage, and staff procedures.
Blue Goat Cyber Physical Security Review
Lucas Straughn
Manager

Steps to Schedule Your Physical Security Review:

1.Schedule a 30-minute Discovery Session

2. We determine IF and HOW we can help

3. We provide a Tailored Proposal

4. Together, we review the Proposal

physical security review

We perform a cooperative and comprehensive Physical Security Assessment of your facility to evaluate existing controls for potential weaknesses and provide prioritized recommendations for improvement.

High-level methodology:
• Client interviews
• Walkthrough of the facility focusing on the following areas, as applicable:

  • Ingress/Egress access controls (Day and Night)
  • Assess established security zones
  • Equipment security (Server room, communications closets, etc.)
  • Surveillance/CCTV
  • Safety controls
  • Risk of intruders connecting unauthorized devices (USB, sniffers, etc.) to equipment
  • Reporting procedures
  • Employee best practices (clean desk policy, visitor monitoring, etc.)
  • Employee Monitor Placement
  • “After Hours” sweeps of desks
  • Crawl space/raised floor security
  • Shredding / Sensitive Data Disposal
  • Lock up Procedures
  • Screensaver policies
  • Removable Media

PHYSICAL SECURITY REVIEW DELIVERABLE

The Physical Security Review report covers all facets of physical security controls. The report outlines what items were assessed. Assessed items a are categorized based on which security controls were sufficiently met, which were not met, and a gap analysis of steps required to bring the unmet controls into compliance. The gap analysis provides technical, procedural, and user training recommendations in a prioritized manner, based on risk criticality.

Our purpose is simple — to make your organization secure

The number of cybersecurity incidents continues to climb. The variety of attacks continues to grow. It is no longer a question of if you will have a cyber event.