Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

Physische Sicherheit in der Informationssicherheit: Server, Büro und Zugangskontrolle

Physical security is the often-overlooked foundation of information security. This article covers server room security, access control systems, the clean desk policy, laptop theft protection, physical attack vectors (Evil Maid, USB drops), and how physical security measures relate to ISO 27001 and BSI IT-Grundschutz.

Table of Contents (5 sections)

Physical security is the area of information security that is most frequently underestimated. All technical security measures fail if an attacker gains physical access to servers, workstations, or sensitive areas. ISO 27001 therefore dedicates specific controls to physical security (A.7.1–A.7.14).

Why Physical Security Is Critical

Physical attack vectors – what happens with physical access:

Attacker has physical access to a powered-on PC:
  → DMA attack via Thunderbolt/FireWire: read memory directly
  → Cold boot attack: freeze RAM contents, read them
    (Entropy key for BitLocker in RAM!)
  → Screensaver/lock screen: social engineering, tailgating
  → USB drop: tampered USB drive → malware upon insertion
    (BadUSB, Rubber Ducky, O.MG-Cable)

Attacker has access to a powered-off PC:
  → Boot from USB: Extract password hashes
  → Remove HDD, mount in another system: All data readable
    (without disk encryption!)
  → BIOS access: Change security settings

Evil Maid Attack:
  → Attacker has brief physical access (hotel room, office)
  → Manipulate boot sector → next login → password leaked
  → Hardware keylogger between keyboard and PC
  → Interface dongle installed → remote access upon return

Physical security measures prevent this:
  → BitLocker with pre-boot PIN: access to PC impossible without PIN
  → BIOS password: no booting from USB without password
  → Laptop Kensington lock: prevents theft in the office
  → Server in a locked rack: physical access blocked
  → No USB ports on the server: no USB drop possible

Server Room Security

Server room security requirements (BSI IT-Grundschutz INF.2):

Location:
  □ Not on the ground floor (risk of break-in)
  □ Not above water pipes (risk of water damage)
  □ Not next to an exterior wall (temperature fluctuations)
  □ No conspicuous "SERVER ROOM" sign on the door!
  □ Physically separated from public areas

Access:
  □ Access control: transponder/chip, no mechanical key
  □ Logging: who entered/exited and when
  □ No uncontrolled access for suppliers, cleaning staff
  □ Escort: external persons must always be accompanied
  □ Video surveillance at entrance (observe GDPR!)

Physical burglary protection:
  □ Door: Security class (SK3 for important servers, SK4 for critical ones)
  □ Walls/floor/ceiling: no vulnerabilities (raised floor, suspended ceiling → access?)
  □ Burglar alarm system (BAS)
  □ Locks: Cylinders with protective fittings

Server racks:
  □ Locked racks (keys only held by IT admins)
  □ No hot-plug ports accessible from outside the rack
  □ Combination locks or electronic locks for racks
  □ Front and rear panels locked

Environmental conditions:
  □ Temperature: 18–24°C (redundant air conditioning!)
  □ Humidity: 40–60%
  □ Fire protection: Gas suppression system (no water sprinklers!), fire detectors
  □ UPS (Uninterruptible Power Supply): min. 15–30 minutes of backup
  □ Emergency generator for extended outages
  □ Water leak detectors under raised floor

Documentation (for ISO 27001 audit):
  □ Access log: who, when, why
  □ Visitor logbook for external persons
  □ Maintenance logs for air conditioning, UPS
  □ Floor plan with security zones

Access control systems

Types of access control systems:

Transponder/RFID systems:
  → Card readers on doors, employee badges with RFID chips
  → Centralized management: easily revoke access rights upon departure
  → Logging: complete audit trail
  → Cost: ~500–2000 EUR/door + management software
  → Known vulnerabilities: RFID can be cloned (Mifare Classic)
    → Solution: Mifare DESFire EV3 or SEOS for higher security

PIN keypads:
  → Simple, no card required
  → Disadvantage: PINs are shared (no audit trail of who entered!)
  → Disadvantage: Shoulder surfing (camera-based attack)
  → Only suitable for less critical areas

Biometrics:
  → Fingerprint, iris, palm vein, facial recognition
  → Highest security, non-transferable
  → GDPR: biometric data = special category → Data protection impact assessment!
  → Costs: significantly higher than RFID
  → Use: for particularly critical areas (data center core, safe)

Combined (physical two-factor):
  → Card + PIN = two factors
  → Card + fingerprint = very high security
  → For areas with very high security requirements

Recommendation for zoning:
  Zone A (normal): Office areas → mechanical lock or simple RFID
  Zone B (enhanced): Server room antechamber → RFID with logging
  Zone C (high):   Server room core area → RFID + PIN or biometrics
  Zone D (critical): Control cabinets, safe → Mechanical + Electronic + Biometrics

Laptop and Mobile Device Security

Mobile device protection:

Hard drive encryption - mandatory:
  Windows: BitLocker
  → Full drive encryption via TPM
  → Activation via Intune:
    Device Configuration → Endpoint Protection → BitLocker
    → Require device encryption: Yes
    → BitLocker startup authentication: Require PIN

  macOS: FileVault
  → System Preferences → Privacy & Security → Enable FileVault
  → Keep recovery key safe (Intune can manage it)

  Linux: LUKS (Linux Unified Key Setup)
  cryptsetup luksFormat /dev/sda2  # Encrypt partition

Without disk encryption:
  Laptop stolen → all data readable!
  GDPR: Mandatory reporting of data breaches!

BitLocker with pre-boot PIN (against Evil Maid):
  Without PIN: TPM unlocks automatically during boot → stolen laptop boots!
  With PIN: Laptop requires PIN before every boot → stolen laptop unusable

  GPO: Computer Configuration → BitLocker Drive Encryption
    → Configure startup PIN: "Require PIN at startup"

Remote Wipe:
  → MDM (Intune/JAMF) can remotely wipe the device
  → Prerequisite: Device must be online at the next available time
  → For immediate protection: Remote BitLocker key rotation

Kensington locks:
  → Mechanical anti-theft protection in the office
  → Useful for publicly accessible areas
  → Recommendation: Kensington ClickSafe 2.0 or MiniSaver

Clean Desk Policy:
  → Do not leave sensitive documents on the desk
  → Lock the screen when leaving the workstation (Windows+L, Ctrl+Command+Q)
  → Shredder for sensitive documents (DIN 66399 P-4 or higher)
  → Lockable rolling cabinet for sensitive documents

Physical Attacks in Penetration Tests

Physical attack vectors in a red team context:

USB drops:
  → Leave a tampered USB drive in the parking lot or entrance area
  → Pre-printed label: "Q4 Payroll Summary" or "Application Documents"
  → 45% of people plug in found USB drives (IBM Security, 2016)
  → Protection: Disable USB ports in BIOS or allow only authorized devices (USB whitelist)

Tailgating:
  → Following authorized individuals through secured doors without proper authorization
  → Common scenarios: "I forgot my card," a delivery person carrying packages
  → Protection: Training (do not let anyone in without a card!), security gates (Mantrap)

Physical social engineering:
  → "IT technician" for maintenance → finds ways through the building
  → Uniforms, tools: build trust
  → Protection: escort all external visitors, verify identity, registration required

Dumpster diving:
  → Documents from the trash instead of the shredder
  → Found: Customer data, internal memos, login credentials on Post-its
  → Protection: Mandatory shredding for all sensitive documents

Physical testing (within pentest scope):
  → AWARE7 offers physical penetration tests
  → Test: How easy is it for outsiders to gain access to the server room?
  → Result: Report detailing identified vulnerabilities + recommendations for improvement

ISO 27001 Controls for Physical Security (A.7.x):
  A.7.1: Physical Security Zones
  A.7.2: Entry Controls
  A.7.3: Securing Offices, Rooms, and Facilities
  A.7.4: Physical Security Monitoring
  A.7.5: Protection against physical threats
  A.7.6: Working in security areas
  A.7.7: Clean desk and clean screen (Clean Desk Policy)
  A.7.8: Placement and protection of equipment
  A.7.9: Security of assets outside business premises (mobile devices!)
  A.7.10: Storage Media (Disposal, Transfer)
  A.7.11: Utility Systems (Electricity, Air Conditioning)
  A.7.12: Cabling Security
  A.7.13: Maintenance of Equipment
  A.7.14: Secure Disposal or Reuse of Equipment

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen — CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking — Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
This article was last edited on 04.03.2026. Responsible: Chris Wojzechowski, Geschäftsführender Gesellschafter at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung