• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to secondary navigation
  • Skip to footer

Before Header

About Us | Articles | Free Resources | Podcast | YouTube Channel

Contact Us Subscribe

Bryghtpath

Business Continuity and Crisis Management Consultants

  • Start
        • Start your Resilience Journey

          Moving your organization – or your career – forward on your resilience journey can be a difficult and scary proposition.  Often, we find that prospective clients aren’t quite sure where to start.

          To help you along your journey, we’ve outlined below four curated collections geared towards momentum-building action and advice perfectly paired with your organization’s current stage of resilience.

        • I want to learn more about Resilience

        • We’re just getting started with our resilience program

        • We’re seeking to optimize & mature our resilience program

        • I’m a Resilience Professional seeking to further develop my skills

  • Company
        • About Bryghtpath

        • Our Core Values

        • Meet our Team

        • About Bryghtpath
          • Case Studies & Results
          • Certifications and Awards
          • Contact Bryghtpath
          • Contract Vehicles
          • Media & Professional Appearances
          • Our Clients
          • Our Proven Process
          • Security & Compliance
          • Strategic Partners
          • Work with Us
  • Capabilities
        • Our Capabilities
        • We help your organization strategically navigate uncertainty and disruption.

        • Case Studies & Results

        • Business Continuity as a Service

        • Business Continuity
          • Business Continuity - Overview
          • Business Continuity as a Service (BCaaS)
          • Business Continuity Software
          • Coaching
          • IT Disaster Recovery
          • Resiliency Diagnosis®️
        • Crisis Management
          • Crisis Management - Overview
          • Crisis Communications
          • Crisis Exercises
          • Cyber Crisis Exercises
          • Cyber Incident Response Planning
          • Crisis Playbook®️
          • Global Security Operations Center (GSOC)
          • Resiliency Diagnosis®️
        • Other Capabilities
          • Intelligence & Global Security Consulting
          • Speaking
          • Training
  • Courses & Training
        • Courses & Training

          We’ve created a number of free and premium courses that have helped thousands improve their skills, build more resilient organizations, and lead through organizations through difficult critical moments successfully.

        • Coaching
          • 1-on-1 Coaching Call
          • Private Backchannel
          • Private Coaching Program
        • Free Intro Courses
          • Overview
          • Business Continuity 101
          • Crisis Communications 101
          • Crisis Management 101
        • Premium Courses
          • Overview
          • Custom Training
          • 5-Day Business Continuity Accelerator
          • Communicating in the Critical Moment
          • Crisis Management Academy®️
          • Preparing for Careers in Resilience
  • Expertise
        • Our Expertise
        • Here at Bryghtpath, in our core values, we state that we are humbly confident in our resiliency expertise.

          We write, publish, speak, and train others constantly – striving to share our thought leadership publicly to advance our industry and exercise our curiosity by interacting with other leaders in our practice domains.

        • Ultimate Guide to Business Continuity

        • Ultimate Guide to Crisis Management

        • Case Studies & Results

        • Free Resources & Frameworks
          • Overview - Free Resources
          • Bryghtpath Frameworks
            • Bryghtpath Business Continuity Lifecycle
            • Bryghtpath Crisis Management Framework
            • Bryghtpath Exercise Maturity Model
            • Bryghtpath Global Security Framework
            • Bryghtpath Long-Term Recovery Framework
            • Bryghtpath Professional Reading List
            • Bryghtpath Workplace Violence & Threat Management Toolkit
          • Resiliency Professionals Facebook Group
          • Resource Library
          • Webinars & Videos
          • Whitepapers & Reports
        • Our Thoughts & Insights
          • Articles
          • Lead Through Disruption. Stay Ahead with Bryghtpath.
          • Managing Uncertainty Podcast
          • Media & Professional Appearances
          • YouTube Channel
        • Whitepapers & Reports
          • Global Security Operations Centers & Resilience
          • Managing the Whole Crisis: The Ransomware Challenge
          • Mastering Uncertainty: Strengthening Organizational Resilience
          • Social Activism Campaigns
          • The Resilience Roadmap: 250 Ways to Fortify your Business against Disruption
  • Industries
        • Our Industry Expertise

          Bryghtpath has extensive experience in a number of industries working with clients of all sizes, geographical locations, and business models. As a team, we possess, deep global operating experience on every continent around the world.

        • Industries Overview

        • Case Studies

        • Start your Journey

        • Education

          Education Icon
        • Finance

          Financial Services 800x800
        • Government

          Government Icon
        • Healthcare

          Healthcare Icon 800x800
        • Hospitality & Leisure

          Hospitality & Leisure Industry Icon 800x800
        • Life Sciences

          Life Sciences 800x800
        • Logistics

          Transportation & Logistics Industry Icon 800x800
        • Manufacturing

          Manufacturing Industry Icon 800x800
        • Non-Profits

          Non-Profit Industry Icon 800x800
        • Retail

          Retail Industry Icon 800x800
        • Tech & Media

          Communications Industry Icon 800x800
        • Utilities

          Power & Utilities Icon
  • Products
        • Our Products

          College Classroom - Mature Teacher
        • Crisis Playbook™️

        • Exercise in a Box™️

        • Exercise in a Day™️

        • Books
          • From Panic to Poise: Crisis Management in the Modern World
          • The Continuity Code: Mastering Business Resilience
        • Crisis Playbook™️
          • Overview
          • Active Shooter Plan
          • Emergency Response Guide
          • Fatality
          • Food/Product Recall
          • Protest
          • Violent Attack
        • Maturity Models
          • Overview
          • ASIS Workplace Violence and Active Assailant
          • FFEIC Maturity Model – Business Continuity
          • ISO 22301 – Business Continuity
          • ISO 22361 – Crisis Management
          • ISO 27031 - IT Disaster Recovery
          • NIST 800-53 Contingency Planning Maturity Model
        • Templates & More
          • After-Action Process & Templates
          • Awareness Collateral
          • Business Continuity Plan Templates
          • Crisis Management Plan Templates
          • Disaster Recovery Plan Templates
          • Job Descriptions
  •  

Mobile Menu

  • Start
  • Company
    • About Bryghtpath
      • Case Studies & Results
      • Certifications and Awards
      • Contact Bryghtpath
      • Contract Vehicles
      • Media & Professional Appearances
      • Our Clients
      • Our Proven Process
      • Security & Compliance
      • Strategic Partners
      • Work with Us
  • Capabilities
    • Our Capabilities
    • Business Continuity
      • Business Continuity – Overview
      • Business Continuity as a Service (BCaaS)
      • Business Continuity Software
      • Coaching
      • IT Disaster Recovery
      • Resiliency Diagnosis®️
    • Crisis Management
      • Crisis Management – Overview
      • Crisis Communications
      • Crisis Exercises
      • Cyber Crisis Exercises
      • Cyber Incident Response Planning
      • Crisis Playbook®️
      • Global Security Operations Center (GSOC)
      • Resiliency Diagnosis®️
    • Other Capabilities
      • Intelligence & Global Security Consulting
      • Speaking
      • Training
  • Courses & Training
    • Coaching
      • 1-on-1 Coaching Call
      • Private Backchannel
      • Private Coaching Program
    • Free Intro Courses
      • Overview
      • Business Continuity 101
      • Crisis Communications 101
      • Crisis Management 101
    • Premium Courses
      • Overview
      • Custom Training
      • 5-Day Business Continuity Accelerator
      • Communicating in the Critical Moment
      • Crisis Management Academy®️
      • Preparing for Careers in Resilience
  • Expertise
    • Our Expertise
    • Our Thoughts & Insights
      • Articles
      • Lead Through Disruption. Stay Ahead with Bryghtpath.
      • Managing Uncertainty Podcast
      • Media & Professional Appearances
      • YouTube Channel
    • Free Resources & Frameworks
      • Overview – Free Resources
      • Bryghtpath Frameworks
        • Bryghtpath Business Continuity Lifecycle
        • Bryghtpath Crisis Management Framework
        • Bryghtpath Exercise Maturity Model
        • Bryghtpath Global Security Framework
        • Bryghtpath Long-Term Recovery Framework
        • Bryghtpath Professional Reading List
        • Bryghtpath Workplace Violence & Threat Management Toolkit
      • Resiliency Professionals Facebook Group
      • Resource Library
      • Webinars & Videos
      • Whitepapers & Reports
    • Whitepapers & Reports
      • Global Security Operations Centers & Resilience
      • Managing the Whole Crisis: The Ransomware Challenge
      • Mastering Uncertainty: Strengthening Organizational Resilience
      • Social Activism Campaigns
      • The Resilience Roadmap: 250 Ways to Fortify your Business against Disruption
  • Industries
  • Products
    • Books
      • From Panic to Poise: Crisis Management in the Modern World
      • The Continuity Code: Mastering Business Resilience
    • Crisis Playbook™️
      • Overview
      • Active Shooter Plan
      • Emergency Response Guide
      • Fatality
      • Food/Product Recall
      • Protest
      • Violent Attack
    • Maturity Models
      • Overview
      • ASIS Workplace Violence and Active Assailant
      • FFEIC Maturity Model – Business Continuity
      • ISO 22301 – Business Continuity
      • ISO 22361 – Crisis Management
      • ISO 27031 – IT Disaster Recovery
      • NIST 800-53 Contingency Planning Maturity Model
    • Templates & More
      • After-Action Process & Templates
      • Awareness Collateral
      • Business Continuity Plan Templates
      • Crisis Management Plan Templates
      • Disaster Recovery Plan Templates
      • Job Descriptions
  •  

An overview of Physical Security Penetration Testing (Red Teaming)

You are here: Home / Intelligence & Global Security / An overview of Physical Security Penetration Testing (Red Teaming)
Physical Security Penetration Testing

July 22, 2019 By //  by Bryan Strawser

While companies worldwide continue to focus on incorporating security controls to safeguard computer systems from hackers, physical security should never be dismissed as a lesser problem. Many security breaches occur when attackers take advantage of one or more physical security deficiencies. Physical security penetration testing is one approach that organizations can use to improve their security controls.

Disgruntled ex-employees, crime rings and other nefarious entities employ sophisticated attack techniques and methods to exploit these deficiencies when attempting to gain unauthorized access to a company’s assets and facilities. Once they have breached a trusted environment, attackers may steal hard assets, intellectual property or otherwise cause serious disruptions to a company.

Physical security of a facility is particularly open to multiple misconceptions that could be devastating. For example, installing surveillance equipment around a secured site but failing to monitor the feed or implementing security devices that are easily and quickly avoided by adept social engineers. It is astonishing that many companies are, for the most part, unaware of blatant flaws in their physical security approach until a disaster happens.

But how can a company predict which physical controls are inadequate or missing altogether before the worst happens?

All Facilities are Vulnerable to Physical Security Breaches

Businesses of all sizes may have state-of-the-art security devices, armed guards and strong security policies established but none of that makes a difference when bad actors use verbal deception or piggyback/tailgating techniques to access a facility. Once they have infiltrated unauthorized areas, intruders are free to do actions that could seriously disrupt business operations, ruin a company’s reputation, commit industrial espionage or harm individuals working at the facility. In some cases, business owners may not realize they have been compromised by intruders until days or weeks later. By then, so much damage has been done the business may suffer enough financial damage or notoriety that it does not survive the attack. A few companies may not even inform the proper authorities after learning their physical security devices have been penetrated because they fear backlash from stockholders or employees.

Physical Security Penetration Testing – Why a Red Team is Essential to Your Company’s Overall Security

Physical penetration testing provides real-world exploratory trials of how effective a company’s physical security methods are with protecting equipment, data, and personnel. After discussing your methods with a security consultant, your site will be inspected by professionals who carefully evaluate and note vulnerabilities open to exploitation by attackers.

Primary objectives of physical penetration tests include assessing the ability of current physical security controls to prevent penetration by bad actors and actually testing these controls to determine their efficacy. Physical penetration testers, known as a Red Team, are highly trained, experienced individuals who know how to infiltrate secure environments employing techniques accomplished attackers use. Leveraging their experience to target a company’s most critical security issues, Red Team members act and think like intruders by tailgating employees, attempting to enter secure facilities by talking to employees, circumventing alarms or disabling cameras. Other methods may be used to gain access to a facility depending on the type of security measures utilized by a facility.

Red Teams are trained to elude detection from one or more of the following security devices:

  • CCTVs (closed circuit television cameras)
  • Keypad entry locks
  • Wireless intercoms/video intercoms
  • Motion/sensor detects
  • Single or double deadbolts
  • Door and window locks
  • Steel security doors
  • Remote entry gates

Physical Security Penetration Testing and the Red Team

Physical security penetration Red Teams exceed standard exploitation vehicles used by most companies. Instead of relying on tool-based approaches, a Red Team develops unique attack situations leveraging manual and automated procedures. In addition, Red teams excel in developing programs to fit a company’s security needs at costs accommodating that company’s budget for such expenditures.

Although advanced persistent threats (APTs) is a term commonly referring to cyber attacks, it also specifies attacks involving intruders gaining access to a supposedly secure facility and remaining undetected for extended periods. Physical security penetration testing safeguards against ATPs known to target financial, manufacturing and national defense industries containing sensitive military plans, intellectual property or top-secret data valuable to intruders hired by other companies to perform stealth work.

Acting as a highly cohesive squad of experienced physical security testing experts, Red Teams develop and conduct their exercises using evidence-based TTP (Tactics, Techniques, and Procedures) mimicking today’s seasoned attackers.

Physical security penetration testing performed by a skilled Red Team rigorously test the ability of an organization’s existing security methods. Red Teams also determine if:

  • Alarms, CCTV, locked doors and other access prevention devices can be circumvented. How easy is it for an intruder to piggyback an employee who inputs a door code to gain access to a building?
  • How long an intruder can wander around a facility before they are detected or before anyone questions who they are, what they are doing and how they entered the facility
  • Security policies are adhered to after the facility has closed for the day. In any physical security system, the weakest aspects almost always involve the human element
  • Do telephone calls to a company’s front desk or other guest point screen callers who may be pretending to be an employee or contractor? How easy is it for someone to show up with a package, claim they are delivering something important and allowed to access sensitive areas of a facility?

During physical security penetration testing conducted by a Red Team, employees do not know testing is underway. Necessary for the Red Team to gauge real-life responses to an attempted unauthorized infiltration by an intruder, this exercise mimics classic behaviors used by proficient attackers. Organizations employing cybersecurity techniques would also benefit from using a Red Team to discover inefficiencies that exist outside their computer networks.

Physical security penetration testing exercises could continue for several days or several weeks, depending on the size of the company and if additional gaps continue to be uncovered by the Red Team. Many organizations engage in multiple penetrations testing two or three times per year. Security consultant teams also collaborate using chained, multi-vector attacks, multiple actors, exploiting all known attack paths and using nearly any means to accomplish their mission–preventing lethal threats from infiltrating an organization.

Podcast Episode on Red Teaming

In addition to this article, you may find Episode #57 of our Managing Uncertainty Podcast to be a valuable listen. In this episode, I discuss the concepts of Physical Security Penetration Testing and share some specific examples from my experience.

Want to work with us or learn more about penetration testing?

  • Bryghtpath has conducted physical security penetration testing for many Fortune 500 organizations across several industry sectors. Our experts have provided detailed reporting on physical security opportunities paired with clear-cut recommendations to improve upon those opportunities.
  • Our proprietary Resiliency Diagnosis process is the perfect way to advance your program.  Our thorough standards-based review culminates in a full report, maturity model scoring, and a clear set of recommendations for improvement.
  • Learn about our Free Resources, including articles, a resource library, white papers, reports, free introductory courses, webinars, and more.
  • Set up an initial call with us to chat further about how we might be able to work together

Category: Intelligence & Global SecurityTag: Bryan Strawser, bryghtpath, bryghtpath llc, corporate security, global security, penetration testing, physical security, physical security penetration testing, red teaming, security consultant

About Bryan Strawser

Bryan Strawser is Founder, Principal, and Chief Executive at Bryghtpath LLC, a strategic advisory firm he founded in 2014. He has more than twenty-five years of experience in the areas of, business continuity, disaster recovery, crisis management, enterprise risk, intelligence, and crisis communications.

At Bryghtpath, Bryan leads a team of experts that offer strategic counsel and support to the world’s leading brands, public sector agencies, and nonprofit organizations to strategically navigate uncertainty and disruption.

Learn more about Bryan at this link.

Previous Post: «Podcaster at the Mic Top Business Continuity & Crisis Management Podcasts
Next Post: New Webinar: Shots Fired – Leading in an Active Shooter Incident Dark Background Police Lights 800x800»

Footer

Contact

BRYGHTPATH LLC
+1.612.235.6435

PO Box 131416
Saint Paul, MN 55113
USA


contact@bryghtpath.com

  • Facebook
  • LinkedIn
  • RSS
  • Twitter
  • YouTube

Our Capabilities

  • Business Continuity
    • Business Continuity as a Service (BCaaS)
    • Business Continuity Software
    • Coaching
    • IT Disaster Recovery Consulting Services
    • Resiliency Diagnosis®️
  • Crisis Communications
  • Crisis Management
    • Crisis Exercises
    • Cyber Crisis Exercises
    • Cyber Incident Response Planning
    • Global Security Operations Center (GSOC)
  • Speaking
  • Training

Our Free Courses

Business Continuity 101

Crisis Communications 101

Crisis Management 101

Our Premium Courses

5-Day Business Continuity Accelerator

Communicating in the Critical Moment

Crisis Management Academy®️

Preparing for Careers in Resilience

Our Products

After-Action Templates

Books

Business Continuity Plan Templates

Communications & Awareness Collateral Packages

Crisis Plan Templates

Crisis Playbook®

Disaster Recovery Templates

Exercise in a Box®

Exercise in a Day®

Maturity Models

Ready-Made Crisis Plans

Resilience Job Descriptions

Pre-made Processes & Templates

Site Footer

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


Bryghtpath®, Crisis Management Academy®, Crisis Playbook®, Exercise in a Box®, Exercise in a Day®, Resiliency Diagnosis®, Resilience Operating Model™
and their respective logos are registered trademarks of Bryghtpath LLC in the United States and other countries.


About Bryghtpath LLC | Disclaimer | Privacy | Status Page | Terms of Use

Proudly powered by Mai Theme, the Genesis Framework, and Wordpress.