Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

8.7.1. Perimeter and Internal Physical Controls

💡 First Principle: Physical security operates in concentric rings — the outermost perimeter provides the most warning time; the innermost protected zone (data center floor, server cage) requires the strongest controls because it is closest to the highest-value assets. Controls at each ring must assume the outer ring can be breached and provide independent protection.

Physical security control categories:
CategoryExamplesFunction
DeterrenceSecurity cameras (visible), guards, warning signs, fencingDiscourage attacks before they occur
DetectionMotion sensors, door contact alarms, CCTV recording, glass break detectorsIdentify intrusion in progress
DelayReinforced doors, mantrap/airlock, multiple authentication layersSlow attacker; create response time
ResponseGuards, law enforcement, lockdown proceduresReact to detected intrusion
Perimeter controls (outermost ring):
  • Fencing: 3–4 feet deters casual trespassing; 6–7 feet with barbed wire deters determined intruders; 8+ feet with razor wire indicates high-security facility. Fencing alone is delay and deterrence — it must be paired with detection (cameras, motion sensors) and response (guards).
  • Lighting: Minimum 2 foot-candles at perimeter, 8 foot-candles at entry points. Continuous lighting is standard; standby lighting activates on alarm; responsive lighting activates on motion detection. Well-lit areas deter and enable camera capture.
  • Bollards: Physical barriers preventing vehicle-borne attacks against building entrances. Increasingly common for critical infrastructure and government facilities.
Internal controls (inner rings):
  • Badge access systems: Each badge is associated with permissions defining which doors can be accessed at which times. Logs every access attempt (successful and failed).
  • Badge access reviews: Periodic review of which employees have access to which areas — analogous to logical access reviews. Identify departed employees with active badges, over-provisioned access.
  • Visitor management: All visitors should be escorted, badged, and logged. Visitor badges should be visually distinct and expire.
  • Mantraps/airlocks: Two-door entry requiring authentication at each door; prevents tailgating because the second door will not open until the first is secure.
Physical security monitoring:
  • CCTV (Closed Circuit TV): Covers all entry/exit points, server room floors, parking areas. Digital video recorders must be in secured locations — an attacker who can access the DVR can delete footage.
  • Security guard patrols: Random, documented patrols — predictable schedules can be exploited. Guards should use patrol logging systems (electronic wand checkpoints) to create audit trails.
  • Environmental monitoring: Temperature, humidity, water leak, and power anomaly sensors in data centers — environmental failures can be more destructive than physical intrusion.

⚠️ Exam Trap: A common physical security exam scenario involves an employee who holds the door open for someone who doesn't badge in ("tailgating" or "piggybacking"). This is a social engineering attack that bypasses all electronic access controls. The correct response from the observing employee is to politely challenge the person and require them to use their own credential. Security culture — where employees feel empowered to challenge unknown individuals — is as important as technical controls.

Reflection Question: A security camera review after a data breach reveals that an unknown individual entered the data center by tailgating behind an authorized employee on three separate occasions over two weeks. The authorized employee claims they didn't notice. What physical security control failures does this reveal, what technical control would have detected or prevented the tailgating, and what cultural control must also be addressed?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications