By Frank Wickham on Mar 07, 2012
On a recent trip to visit family I had a revelation related to security. It's obvious but as I thought about it more It sure was much deeper than my first look. Physical security does track very closely. Lets look deeper at how they relate.
Monitoring = Dedicated entrance road/parking lot
Monitoring = Visitor parking area
Firewall = Guard booth
Internal Firewall = additional guard booth, building reception desk, one building entrance and exit
DMZ = dedicated off site meeting space / conference room in the lobby
Logging = Video surveillance / log book
Logging = Checking vehicle registration
Authorization = Background checking
Authorization = Check ID's
Defense in Depth = Internal office access / production floor access / data center access / control room
Authorization = Escorted or unescorted (trusted)
Encryption = Locked file cabinets / secure storage / shredding
Desk Top Virtualization = Shared Office Space
Some the analogies can be debated but I think you get the idea. As you now see physical security parallels very closely IT security. No wonder why, physical security has been around for centuries. IT security is relatively new. Use history to see what might be the next big threat to IT security.