Physical Security

During Physical Security assessments, TrustedSec bridges the physical security components with the technological component to bring a blended approach to infiltrating physical locations. Depending on the needs of the organization, TrustedSec can perform full attacks on physical locations, which include piggy backing, lock picking, impersonation, badge cloning, and other techniques to gain access to a facility. TrustedSec can also perform a physical security assessment that is overt in nature and does not rely on physically attacking the location itself.

With TrustedSec, you can:

  • Simulate a physical break-in, of varying sophistication levels, to gain access to sensitive areas of a location
  • Incorporate the technological aspects and attempt to penetrate the network once inside the organization
  • Identify key areas of deficiencies within a physical location to develop tactics for preventing loss and breaches
  • Test education and awareness program to identify if employees recognize patterns of attack, such as piggy backing and badge cloning
  • Improve and strengthen the overall physical security program by identifying direct weaknesses that an attacker can use to gain access to a location

Physical Assessments include:

Penetration Testing

In order to gain unauthorized access to a facility and attempt to identify trophies and objectives, TrustedSec consultants stage an attack of a physical location (or multiple locations). During the assessment, this could include badge cloning, piggy backing, lock picking, camera avoidance, impersonation, surveillance system hacking, and more.

Physical Security Review

With a focus on identifying gaps and weaknesses within physical security, this non-attack-based approach includes overt testing rather than penetration testing scenarios.

Technical Surveillance and Counter-Measures (TSCM)

Perform bug sweeping and TSCM to identify transmitting or listening devices within a physical location. TrustedSec can perform baseline sweeps and radio frequency (RF) analysis to determine if bugs are present in physical locations.

Featured Content

Research + Red Team + Risk Management: Assessing Evolving Threats

Download

Talk with an Expert

  • This field is for validation purposes and should be left unchanged.
David Kennedy

Author: David Kennedy

Security expert, keynote speaker, avid gamer and the go-to for protecting companies from threats.