The convergence of physical security and IT - integrating physical and IT security management

October 2005 Integrated Solutions

Protection systems integrate people, procedures and equipment to safeguard assets against theft, sabotage and other malevolent attacks. Organisations typically have two major protection systems, one for physical security and one for IT security.

Physical security and IT security

Physical security focuses on the protection of physical assets, personnel and facility structures. This involves managing the flow of individuals and assets into, out of, and within a facility. IT security focuses on the protection of information resources, primarily computer and telephone systems and their data networks. This involves managing the flow of information into, out of, and within a facility's IT systems, including human access to information systems and their networks. Clearly these two are separate domains. Why should they be integrated?

A management issue

The question above accurately reflects the thoughts of most security practitioners as they approach this subject. How is the question misleading? To lean on a common idiom, it focuses on the trees rather than the forest.

No one is going to integrate a brick wall and a database. However, the management of who is allowed inside the wall and inside the database must be integrated, or there will be gaps in the organisation's security. Figure 1 below illustrates the concept of integrated security management. Whenever you hear or read the phrase 'integration of physical and IT security,' think 'integration of physical and IT security management' and you will be on the right track.

In almost every large enterprise, the physical and IT security departments operate independently of each other. They are generally unaware of the strengths and weaknesses of one another's practices, the liabilities of operating independently, and the benefits of integrated security management.

Integrating security management

Security objectives are carried out through the application of security policies, processes and procedures. Figure 2 below describes key security management processes and the physical and IT security processes and technologies that support them.

While it is true that many of the physical and IT security processes and procedures must be integrated at the technology level, it is not the technology that defines the integration. The business processes and procedures define it; the technology implements it. That is why the first step in integrating physical and IT security is an examination of security-related business requirements and the physical and IT security processes that support them. The integration of the business processes will determine where integration of physical security and IT technology is required.

In 'The Convergence of IT and Physical Security', an article written for Faulkner Information Services, a provider of in-depth information for technology professionals (www.faulkner.com), Laurie Aaron, director of business development for Tyco Safety Products' North American Sales Channels, says, "The lack of technical integration between physical security systems and IT security systems has resulted in organisational and procedural gaps for virtually every organisation in the world. Beside a few government agencies, very few organisations have adopted a comprehensive security strategy encompassing both physical and IT security. From an organisational standpoint, very few organisations have formal procedures in place between the different departments handling physical and IT security. Excessive risk exposure results from this lack of manageability."

If an organisation fails to examine its security procedures, gaps in protection are certain to occur. Usually the larger the company, the larger the security gaps, and the larger the opportunities for cost reduction.

Tatum Partners (www.tatumpartners.com) is the largest professional services provider of financial and information technology leadership in the United States. Tatum is a national organisation of 400 former chief financial, chief information and chief technology officers of world-class organisations such as the CIA, Nabisco, Hilton, Disney and IBM.

Joel Rakow, a Tatum partner located in the Los Angeles area, said, "We encourage every client, if they do nothing else, to integrate physical access controls with the corporate network. It lays the groundwork for a proactive security programme that enables early detection of emerging security attacks, and it produces immediate reduction of the cost of the security effort. Our Tatum CFOs calculate the return on investment to be between 16 and 18 months.

"We also like to point out that integrating physical and data security is a great mitigator against the legal liability of being found negligent in our client's 'duty to protect' sensitive information protected by such legislation as California Senate Bill 1386, Gramm-Leach-Bliley and HIPAA," said Rakow.

Benefits of centralised management

Managing users, their privileges and their credentials - a process called user provisioning - is one of the biggest challenges faced by organisations. Typically, HR makes the first database entry for a new user, in support of payroll and other employee-related functions. Security makes another entry, to provide an access control card/ID badge for physical access to facilities. IT makes a third entry, to provide access to information systems. The results of inconsistencies between the three areas range from personal inconvenience, such as an employee being denied access to parking or to the computer network, to significant corporate risk, such as failure to suspend physical or network access privileges immediately upon termination.

Such inconsistencies motivate people to bypass security by manually affording access (holding a door open) or sharing information system passwords. This often results in a person gaining access to areas and information to which he or she would not normally have access. These types of access violations are undocumented. Furthermore, not having centrally managed users means that the question 'Who has access to what?' cannot be answered quickly enough to provide ideal response times in the event of a suspected breach or a heightened security condition.

Reducing the user provisioning steps from three down to one not only eliminates the security vulnerabilities and enforces consistent role-based privileges across the entire organisation, but may drastically reduce the cost of managing users.

Challenges to integration

The sidebar titled 'Platforms Supporting Integration' presents three vendors of security management products that offer significant support for the integration of physical and IT security. Two of the product offerings are comprehensive physical security application suites, and one is a product specifically designed to integrate physical and IT security management. While several thousand customers currently use the two security application suites, few are currently integrating physical and network security. Why?

There are several distinct challenges that to date have hindered efforts to integrate physical and IT security, including the following:

* Initial focus on technology issues rather than security management issues.

* Conflicting or lacking standards.

* Apparent reluctance of physical security practitioners to embrace IT.

* No clear roadmap to organisational readiness.

To be continued





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...
Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Cape Town estates gain access to advanced security technology at Securex
Securex South Africa News & Events Integrated Solutions
For the first time, estate and complex security decision-makers in the Western Cape will have direct access to the breadth of solutions and expertise these shows are synonymous with.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
SMART Estate Security Conference KZN 2025
Arteco Global Africa OneSpace Technologies SMART Security Solutions Technews Publishing Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
May 2025 saw the SMART Security Solutions team heading off to Durban for our annual Estate Security Conference, once again hosted at the Mount Edgecombe Country Club.

Read more...
Community-centric security architecture
Regal Security Distributors SA Integrated Solutions Residential Estate (Industry)
Securing any large area, whether it is a commercial park or a residential estate, is as much about protecting and monitoring the internal environment as it is about protecting the perimeter.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.