Cybersecurity - Lesson 5
Cybersecurity - Lesson 5 of 6

Policies, Procedures & Physical Security

The most sophisticated firewall in the world won't stop someone walking out the door with a hard drive. This lesson covers the organisational and physical side of security - access control, policies, physical measures, penetration testing, and backups.

45 - 60 min Access Levels, AUPs, Physical Security, Pen Testing, Backups

Every password was strong. Every port was locked down. The firewall hadn't let a single unauthorised packet through in three years. Then a contractor walked into the server room - which was unlocked, as it often was - plugged in a USB drive, copied the entire customer database, and walked out. The door was never even on anyone's radar as a security risk.

Think about it: Which of the technical measures we've studied would have prevented this? What type of measure was missing?

Technical measures are essential - but they protect the digital layer. Policies, procedures and physical security protect the human and physical layer. A complete security strategy needs both.

Why this matters in the exam

Scenario questions often ask you to identify security weaknesses. If the scenario involves someone being in the wrong place, accessing things they shouldn't, or a disaster destroying data - think physical security, access control, and backups. These aren't just background topics - they're full mark opportunities.

User access levels and acceptable use policies

Measure 1
User Access Levels

The principle of least privilege: every user should have only the minimum access rights needed to perform their role. A teacher needs access to mark books and registers. They should not have access to the payroll system, other teachers' personal files, or system administration tools.

Access levels are typically managed through user accounts and permissions. An administrator account has the highest access; a guest account the lowest. Strictly enforcing these limits means that if an account is compromised, the attacker can only access what that account can access - not the whole system.

Exam tip: Always explain the benefit - "limiting access means a compromised account can only cause limited damage." Examiners want to see you understand why it's useful, not just what it is.
Measure 2
Acceptable Use Policy (AUP)

An Acceptable Use Policy is a document that sets out the rules governing how an organisation's IT systems may be used. It defines what is permitted, what is prohibited, and what the consequences of violations are.

A typical school AUP might prohibit accessing social media on school devices, downloading files without authorisation, attempting to bypass content filters, or sharing account credentials. An employee AUP might restrict personal use of company devices, prohibit installing unlicensed software, and require reporting of suspicious activity.

Exam tip: An AUP is a document that sets rules - it doesn't technically prevent anything on its own. Its value is in setting expectations, establishing legal grounds for consequences, and encouraging responsible behaviour.
Least privilege
Each user is given only the minimum permissions needed for their role - no more.
User permissions
The specific actions a user account is authorised to perform - read, write, delete, execute, administer.
Acceptable Use Policy
A set of rules governing permitted and prohibited use of an organisation's IT systems.

Physical security, penetration testing and backups

Measure 3
Physical Security

Physical security restricts who can physically access hardware, servers, and sensitive areas. No amount of software security prevents an attacker who can physically sit at an unlocked server.

Physical measures include: locked server rooms with keycard or biometric access; CCTV monitoring to deter and record unauthorised access; cable locks to prevent device theft; visitor sign-in procedures; and secure disposal of old hardware (destroying hard drives before disposal).

Exam tip: Physical security is often overlooked by students in exam answers. If a scenario mentions a breach involving physical access to hardware, the answer almost certainly involves physical security measures.
Measure 4
Penetration Testing

Penetration testing (pen testing) is authorised, ethical hacking. An organisation hires security professionals to simulate real attacks on their systems - attempting to break in using the same techniques malicious attackers would use.

The goal is to find and fix vulnerabilities before attackers discover them. A successful pen test might find an unpatched server, a poorly configured firewall, staff who respond to simulated phishing emails, or a server room with weak physical access controls.

Exam tip: The key word is authorised - pen testing is legal and ethical because the organisation has given explicit permission. Examiners often ask you to explain both what it is AND why it is useful.
Measure 5
Backups & Disaster Recovery

A backup is a copy of data stored separately from the original, enabling recovery if data is lost, corrupted, or encrypted by ransomware. Regular backups are one of the most critical security measures for business continuity.

Backup best practice (the 3-2-1 rule): keep 3 copies of data, on 2 different types of media, with 1 stored off-site (or in the cloud). This ensures that a single disaster - fire, flood, ransomware - cannot destroy all copies.

Exam tip: Emphasise that backups must be stored separately from the original. A backup on the same network as the original will also be encrypted by ransomware and is useless.

Security audit challenge

Read the scenario below and tick the security measures that would directly address the weaknesses described. Select all that apply, then check your answers.

Scenario: MedCore Health Ltd
Select all appropriate security measures
MedCore Health Ltd is a medical data company. All 50 employees share the same admin-level login. The server room has no lock and is accessible to anyone in the building, including delivery staff. The company has no documented rules about device usage. Patient records are only stored on a single server with no backup. They have never reviewed their security posture.
Implement user access levels - different accounts with role-appropriate permissions
Install a VPN - for remote employees to access the office network
Secure the server room - keycard access, CCTV, and restricted entry
Create an Acceptable Use Policy - defining permitted and prohibited device usage
Implement a backup system - regular off-site copies of all patient records
Commission penetration testing - to identify security weaknesses before attackers do
Upgrade to fibre optic internet - for faster data transfer speeds
5-Question Check
Policies, procedures & physical security
Question 1 of 5
An organisation hires a team to attempt to break into their systems using the same techniques a real attacker would. What is this called?
Question 2 of 5
A company is hit by ransomware that encrypts all files on its server. It recovers all data within hours. What security measure made this possible?
Question 3 of 5
What is the principle of least privilege?
Question 4 of 5
Why is it important to store backups separately from the original data?
Question 5 of 5
An employee is found to have been accessing colleague files they have no reason to view. What security measure would have prevented this?
0/5
Questions answered correctly
Think deeper

Penetration testing identifies security vulnerabilities. However, some people argue that it creates risks because the testers learn how to break into the system. Evaluate whether the benefits of penetration testing outweigh the risks.

Benefits: Pen testing finds real vulnerabilities before malicious attackers can exploit them - giving the organisation the opportunity to fix them. Unlike waiting for a real attack, pen testing is controlled, documented, and specifically authorised. Organisations can test their incident response capabilities. Many compliance frameworks (such as those for medical or financial organisations) require regular pen tests.

Risks: The pen testers gain detailed knowledge of the system's weaknesses. If a tester later becomes malicious or their findings are leaked, this information could be exploited. There is also a risk of disruption during the testing process itself.

Evaluation: On balance, the benefits significantly outweigh the risks. The vulnerabilities exist whether or not they are tested - a pen test simply finds them first. Reputable pen testing firms operate under strict legal agreements (non-disclosure, indemnity clauses), and the alternative - discovering vulnerabilities only after a real breach - is far more damaging. The risks are manageable; the consequences of ignoring vulnerabilities are not.
Printable Worksheets

Practice what you have learned

Three levels of worksheet for this lesson. Download, print and complete offline.

Recall
Policies and Procedures
Define each policy type and physical measure. Match terms to their purpose and fill in the blanks.
Download
Apply
Policy Analysis
Identify missing policies from scenarios, suggest improvements to physical security, and analyse backup strategies.
Download
Exam Style
Exam-Style Questions
Scenario-based evaluation questions on access control, acceptable use policies, and penetration testing.
Download
Cybersecurity Flashcards
Review all Cybersecurity terms with flashcards. Filter by lesson, shuffle, and track what you know.
Open Flashcards
Teacher Panel
L5: Policies, Procedures & Physical Security
Suggested timing
0–5 min: Hook - unlocked server room scenario
5–20 min: Access levels, AUPs
20–35 min: Physical security, pen testing, backups
35–48 min: Security audit scenario activity
48–60 min: Quiz + Think Deeper
Learning objectives
1
Explain user access levels and the principle of least privilege
2
Describe what an Acceptable Use Policy is and why it matters
3
Identify appropriate physical security measures for a given scenario
4
Explain penetration testing and why regular backups are essential
Starter idea
Before reading the lesson, ask students: "Name 5 ways an attacker could get to your data without hacking any software at all." This opens up thinking about physical access, insider threats, social engineering, backup failure, and policy violations - all covered in this lesson.
Common misconceptions
"An AUP prevents attacks technically" - it's a document. It sets rules but has no technical enforcement on its own.
"A backup on the same server is fine" - ransomware will encrypt it too. Backups must be stored separately.
"Pen testing is hacking" - it is authorised, legal, and ethical. The key word is authorised.
Exit tickets
Explain what an Acceptable Use Policy is and give two examples of rules it might contain for a school network.
[4 marks]
Explain why a company should store backups at a different location from the original data.
[2 marks]
Describe two physical security measures a company could use to protect a server room and explain how each reduces the risk of unauthorised access.
[4 marks]