Physical security is the foundation on which all logical security controls rest. No matter how sophisticated an organisation's cryptography or network security, an attacker with physical access to a server can extract data directly from storage media, reset credentials, or simply steal the hardware. The CISSP exam tests physical security at the architectural level: how are physical spaces designed to protect assets using defence in depth, and what environmental controls are required to maintain operational continuity?

Defence in Depth for Physical Spaces

Physical defence in depth applies concentric layers of security controls, each requiring a separate compromise for an attacker to advance toward the most sensitive assets.

The outermost layer is the site perimeter: fences, vehicle barriers (bollards and berms to prevent vehicle ramming attacks), security lighting, and perimeter intrusion detection sensors. The site perimeter defines the boundary between public space and the organisation's controlled area.

The building layer includes external walls, controlled entry points (security vestibules, also called mantraps), access control systems (badge readers, key pads), visitor management (sign-in, escort requirements), and security guards. A mantrap (or airlock) is a small room with two interlocking doors — only one can be open at a time — that prevents tailgating (an unauthorised person following an authorised person through a secured door).

The floor or area layer restricts access to sensitive areas within the building. Server rooms, data centres, and telecommunications rooms should be locked and require separate authentication. Operations areas may have glass walls for visibility (to observe activity) or solid walls for confidentiality (to prevent shoulder surfing of screens).

The rack or cabinet layer is the innermost layer: individual server cabinets with locks that require separate keys or access codes. Even inside a secured server room, individual racks may hold different classification levels of equipment.

For the exam: the layered physical security model is directly tested. When a question describes a physical security design, count the layers and identify which is most appropriate for the threat scenario.