Physical security

2.1 Summarize physical and logical security measures

📘CompTIA A+ Core 2 (220-1202)


Physical Security Measures in IT Environments

Physical security is all about protecting the actual hardware, devices, and facilities from theft, damage, or unauthorized access. This is just as important as software security because if someone can physically access your servers or computers, they can bypass many software protections.

Here’s a detailed explanation of the common physical security measures:


1. Bollards

  • What they are: Strong vertical posts usually made of metal or concrete.
  • Purpose in IT: Prevent unauthorized vehicles from crashing into buildings that house servers, networking equipment, or sensitive IT offices.
  • IT context: In a data center, bollards protect the building entrances where critical servers are stored from potential vehicle-based attacks or accidents.

2. Access Control Vestibule

  • What it is: A small secure area, like a “double-door” system. Only one door can open at a time.
  • Purpose in IT: Prevents unauthorized people from tailgating (following someone in) into a secure area.
  • Example: At a server room, a user scans their badge to enter the vestibule. The first door locks, and only after authentication does the second door open to the server room.

3. Badge Reader

  • What it is: An electronic device that reads ID badges or access cards.
  • Purpose in IT: Ensures that only authorized personnel can enter sensitive areas like network rooms, server closets, or IT labs.
  • How it works: Employees scan their badges; the system logs entry times and prevents unauthorized access.

4. Video Surveillance

  • What it is: Cameras installed to monitor activity.
  • Purpose in IT: Detects and deters unauthorized access, tracks suspicious behavior, and provides evidence if an incident occurs.
  • IT context: Data centers, server rooms, and network closets often have cameras monitoring all entry points and internal areas.

5. Alarm Systems

  • What it is: Electronic systems that trigger an alert when unauthorized activity is detected.
  • Purpose in IT: Warns security staff about breaches such as doors being forced open, windows broken, or unauthorized access attempts.
  • IT use: If someone tries to open a server room door without proper authorization, an alarm can notify security immediately.

6. Motion Sensors

  • What they are: Devices that detect movement in an area.
  • Purpose in IT: Alerts security if someone is moving in restricted areas outside of working hours.
  • Example: Motion sensors inside a server room detect movement after hours and can trigger alarms or activate cameras.

7. Door Locks

  • What they are: Physical locks on doors that can be mechanical or electronic.
  • Purpose in IT: Restrict access to IT rooms, network closets, or storage areas.
  • Types:
    • Mechanical locks: Traditional key locks.
    • Electronic locks: Require PINs, RFID badges, or biometrics.
  • IT context: Ensures that only trained IT staff can enter areas where critical equipment is kept.

8. Equipment Locks

  • What they are: Locks that secure individual devices or components.
  • Purpose in IT: Prevents theft of computers, servers, or network devices.
  • Examples:
    • Laptop cable locks.
    • Rack-mounted server locks.
    • KVM (keyboard, video, mouse) switch locks.

9. Security Guards

  • What they are: Personnel trained to monitor and protect physical areas.
  • Purpose in IT: Provide immediate response to security threats, monitor surveillance feeds, and check credentials of personnel entering IT facilities.
  • IT context: Guards may patrol data centers, server rooms, or office floors to ensure physical security protocols are followed.

10. Fences

  • What they are: Physical barriers around the perimeter of a building or property.
  • Purpose in IT: Prevent unauthorized entry into the facility.
  • IT example: A data center surrounded by a tall, secure fence limits access to IT hardware from outsiders or intruders.

Key Takeaways for the Exam

  1. Physical security protects hardware, data, and IT facilities from theft, damage, or unauthorized access.
  2. Each measure works together to create layers of security (layered security is important in IT).
  3. Common IT examples include protecting server rooms, network closets, and critical workstations.
  4. Many physical security measures are monitored electronically (e.g., badge readers, alarms, cameras).

Tip: For the exam, remember physical security = anything that keeps unauthorized people from touching or accessing your IT equipment, and think in layers: fences → guards → doors → cameras → alarms → locks → sensors → equipment locks.

Buy Me a Coffee