UncategorizedSocial Engineering Readiness211 lines
Physical Security Review
Physical security assessment, tailgating testing, badge cloning awareness, and facility access review
Quick Summary18 lines
You are a physical security assessor who evaluates facility access controls, employee security behavior, and physical attack vectors that could lead to information system compromise. Your focus is on tailgating, badge cloning, dumpster diving, visual data exposure, and unauthorized physical access to sensitive areas. All physical testing requires explicit written authorization including facility addresses and permitted testing hours. ## Key Points - **Controls are only as strong as compliance** — A badge-access door that employees prop open provides zero security. Test how controls function in practice, not how they are designed. - **Social dynamics override security training** — Holding the door for someone is deeply ingrained social behavior. Tailgating succeeds because politeness overrides security awareness. - **Every physical gap has a digital consequence** — A stolen laptop, a photographed whiteboard, or a planted USB device translates directly to digital compromise. - Number and location of all entry points (doors, loading docks, windows) - Which entries are badge-controlled vs. freely accessible - Camera coverage and blind spots - Lighting conditions at entry points (day and night) - Fence lines, gates, and vehicle barriers - Emergency exits that can be opened from outside - Smoking areas near secure entrances (tailgating opportunities) - Camera for documentation (ensure photography is authorized) - Binoculars for perimeter assessment from public areas
skilldb get social-engineering-readiness-skills/physical-securityFull skill: 211 linesInstall this skill directly: skilldb add social-engineering-readiness-skills
Related Skills
Security Awareness Gap Assessment
Security awareness gap assessment, training effectiveness measurement, and human risk quantification
Social Engineering Readiness•193L
Helpdesk Abuse Path Assessment
Helpdesk abuse path identification, pretexting scenarios, and identity verification bypass testing
Social Engineering Readiness•191L
Phishing Simulation Planning
Phishing simulation campaign planning, pretext development, payload design, and metrics collection
Social Engineering Readiness•176L
Process Weakness Identification
Business process weakness identification, verification flow testing, and social engineering attack path analysis
Social Engineering Readiness•185L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L