Security Assessment Use Cases
The following documents represent sample security assessment reports conducted using the FORTRESS Framework. These assessments demonstrate real-world application of physical security testing methodologies across various compliance frameworks including FedRAMP, HIPAA, and NIST SP 800-53.
Physical Security Assessment Report
Executive Summary
This physical security assessment was conducted in accordance with FedRAMP PE-2 (Physical Access Authorizations) requirements to evaluate the effectiveness of physical access controls at facilities. The assessment scope included evaluation of visitor access procedures, employee authorization processes, and physical access control systems (PACS) implementation.
The assessment was performed over a day period from through , 2024. Testing activities included physical walkthroughs, access control system reviews, documentation analysis, and controlled access attempts at primary facilities located in .
Scope and Methodology
The assessment followed the FORTRESS Framework methodology, specifically addressing FedRAMP PE-2 control requirements:
- PE-2.1: Physical access authorizations are issued to individuals before access is granted
- PE-2.2: Physical access authorizations are reviewed and updated at least annually
- PE-2.3: Physical access authorizations are revoked when access is no longer required
Testing methodologies included:
- Review of physical access authorization policies and procedures
- Examination of access control system configurations and user databases
- Verification of authorization issuance and revocation processes
- Testing of visitor management procedures
- Review of access logs and audit trails
Key Findings
| Finding ID | Description | Severity | FedRAMP Control |
|---|---|---|---|
| FR-PE2-001 | Physical access authorization database contains inactive user accounts that have not been reviewed in over 12 months, violating PE-2.2 annual review requirement. | HIGH | PE-2.2 |
| FR-PE2-002 | Visitor access procedures at facility do not require pre-authorization for all visitor types, potentially allowing unauthorized physical access. | MEDIUM | PE-2.1 |
| FR-PE2-003 | Access revocation process lacks automated notification to physical security personnel when employee termination occurs, creating a window of potential unauthorized access. | MEDIUM | PE-2.3 |
| FR-PE2-004 | Access control system at secondary facility does not maintain complete audit logs of authorization changes, limiting accountability. | LOW | PE-2 |
Recommendations
Based on the assessment findings, the following recommendations are provided to achieve full FedRAMP PE-2 compliance:
- Immediate Action Required: Conduct comprehensive review of all physical access authorizations and remove inactive accounts within days.
- Implement automated quarterly access reviews to ensure PE-2.2 compliance is maintained on an ongoing basis.
- Update visitor management procedures to require pre-authorization for all visitor categories, including contractors and temporary personnel.
- Establish automated integration between HR systems and physical access control systems to ensure immediate revocation upon employee termination.
- Enhance audit logging capabilities to capture all authorization changes, including who authorized the change and when it occurred.
Conclusion
While has implemented foundational physical access authorization controls, several gaps were identified that prevent full compliance with FedRAMP PE-2 requirements. The organization should prioritize remediation of high-severity findings FR-PE2-001 and FR-PE2-002 to maintain FedRAMP authorization status. With implementation of the recommended controls, the organization should achieve full PE-2 compliance within months.
This report contains confidential and proprietary information. Distribution is restricted to authorized personnel only. Unauthorized disclosure may result in legal action. Report prepared in accordance with FORTRESS Framework v9.0.
HIPAA Physical Safeguards Assessment
Executive Summary
This assessment evaluated physical safeguards implementation at , a healthcare organization subject to HIPAA regulations. The assessment focused on compliance with §164.310(a)(1) - Facility Access Controls and §164.310(b) - Workstation Use requirements, which mandate physical protections for electronic protected health information (ePHI).
The assessment was conducted at facilities across states, including primary data centers, medical offices, and administrative facilities. Testing occurred from through , 2024.
Scope and Methodology
Assessment activities addressed the following HIPAA requirements:
- §164.310(a)(1) - Facility Access Controls: Implementation of physical safeguards to limit access to facilities where ePHI is stored or processed
- §164.310(b) - Workstation Use: Implementation of physical safeguards for workstations that access ePHI
Testing methodologies included:
- Physical security walkthroughs of facilities housing ePHI systems
- Review of access control systems and visitor management procedures
- Evaluation of workstation physical security controls
- Testing of physical barriers and environmental controls
- Review of policies and procedures documentation
- Verification of workforce training on physical safeguards
Key Findings
| Finding ID | Description | Severity | HIPAA Section |
|---|---|---|---|
| HIPAA-164.310-001 | Medical records storage room at facility lacks proper access controls. Room is accessible via key that is not tracked or logged, violating facility access control requirements. | HIGH | 164.310(a)(1) |
| HIPAA-164.310-002 | Workstations in department are positioned such that ePHI is visible to unauthorized individuals passing through common areas, violating workstation use requirements. | HIGH | 164.310(b) |
| HIPAA-164.310-003 | Data center housing ePHI servers lacks visitor escort procedures. visitors were observed unescorted during assessment period. | MEDIUM | 164.310(a)(1) |
| HIPAA-164.310-004 | Workstation use policies do not address physical security requirements for mobile devices and laptops that access ePHI outside of primary facilities. | MEDIUM | 164.310(b) |
| HIPAA-164.310-005 | Access logs for facility are retained for only days, which may be insufficient for audit purposes. | LOW | 164.310(a)(1) |
Recommendations
To achieve full compliance with HIPAA §164.310(a)(1) and (b), the following remediation activities are recommended:
- Immediate Action Required: Implement electronic access control system for medical records storage areas, replacing unlogged key access. System should log all access attempts and integrate with employee database.
- Reposition workstations displaying ePHI to prevent unauthorized viewing. Consider privacy screens, workstation placement adjustments, or physical barriers.
- Establish mandatory visitor escort procedures for all areas containing ePHI systems. All visitors must be escorted by authorized personnel at all times.
- Update workstation use policies to include physical security requirements for mobile devices, including laptop locks, secure storage requirements, and screen lock policies.
- Extend access log retention to minimum of months to support audit and investigation requirements.
- Conduct annual workforce training on physical safeguards requirements, including workstation use policies and facility access procedures.
Conclusion
has implemented basic physical safeguards, but several critical gaps were identified that could result in unauthorized access to ePHI. The organization should prioritize remediation of findings HIPAA-164.310-001 and HIPAA-164.310-002, as these represent direct violations of HIPAA physical safeguard requirements. Implementation of recommended controls should be completed within days to minimize risk of HIPAA violations and potential regulatory action.
This report contains confidential and proprietary information. Distribution is restricted to authorized personnel only. Unauthorized disclosure may result in legal action. Report prepared in accordance with FORTRESS Framework v9.0.
NIST SP 800-53 PE-3 Physical Access Control Assessment
Executive Summary
This assessment evaluated physical access control implementation at in accordance with NIST Special Publication 800-53 Revision 5, Control PE-3 (Physical Access Control). The assessment focused on the organization's ability to enforce physical access authorizations through physical access control systems, guards, and access control points.
The assessment was conducted at facilities, including data centers, office locations, and remote sites. Testing activities occurred from through , 2024, and included both technical testing and policy review.
Scope and Methodology
The assessment addressed NIST SP 800-53 PE-3 control requirements:
- PE-3.1: Enforce physical access authorizations at entry/exit points
- PE-3.2: Maintain physical access audit logs
- PE-3.3: Control physical access to information system components
- PE-3.4: Escort visitors and monitor visitor activity
- PE-3.5: Secure keys, combinations, and other physical access credentials
Testing methodologies included:
- Physical penetration testing of access control systems
- Review of physical access control system (PACS) configurations
- Evaluation of guard procedures and visitor management
- Testing of badge systems, biometric readers, and other access control mechanisms
- Review of access logs and audit trail completeness
- Assessment of key management and credential storage procedures
- Testing of emergency access procedures
Key Findings
| Finding ID | Description | Severity | NIST Control |
|---|---|---|---|
| NIST-PE3-001 | Access control system at data center failed to enforce access authorizations during of test attempts. System allowed access with expired badges and did not properly validate authorization status. | HIGH | PE-3.1 |
| NIST-PE3-002 | Physical access audit logs are not retained for the minimum required months. Current retention is months, violating PE-3.2 requirements. | MEDIUM | PE-3.2 |
| NIST-PE3-003 | Server room at facility lacks proper access controls. Door can be opened with key that is not tracked in access control system, violating PE-3.3 requirements. | HIGH | PE-3.3 |
| NIST-PE3-004 | Visitor escort procedures at facility are not consistently enforced. unescorted visitors were observed during assessment period. | MEDIUM | PE-3.4 |
| NIST-PE3-005 | Master keys and access codes for facilities are stored in unsecured location accessible to personnel, violating PE-3.5 credential security requirements. | HIGH | PE-3.5 |
| NIST-PE3-006 | Emergency access procedures do not require post-access review or documentation, creating accountability gaps. | LOW | PE-3 |
Recommendations
To achieve full compliance with NIST SP 800-53 PE-3, the following remediation activities are recommended:
- Immediate Action Required: Upgrade access control system at data center to properly validate authorization status in real-time. System must reject expired, revoked, or unauthorized credentials.
- Extend physical access audit log retention to minimum months as required by NIST SP 800-53. Implement automated archival system to ensure logs are preserved.
- Replace mechanical key access to server rooms with electronic access control systems that integrate with centralized PACS and maintain audit logs.
- Implement mandatory visitor escort procedures with automated tracking. All visitors must be logged, escorted, and monitored throughout their visit.
- Secure all physical access credentials (keys, access codes, keycards) in locked, access-controlled storage. Implement key management procedures including inventory, assignment tracking, and regular audits.
- Establish emergency access procedures that require immediate post-access documentation and management review within hours of emergency access.
- Conduct quarterly access control system testing to verify proper enforcement of access authorizations.
Conclusion
While has implemented physical access controls, several critical deficiencies prevent full compliance with NIST SP 800-53 PE-3 requirements. The organization should immediately address high-severity findings NIST-PE3-001, NIST-PE3-003, and NIST-PE3-005, as these represent significant security risks that could allow unauthorized physical access to information systems. With implementation of the recommended controls, the organization should achieve full PE-3 compliance within months.
This report contains confidential and proprietary information. Distribution is restricted to authorized personnel only. Unauthorized disclosure may result in legal action. Report prepared in accordance with FORTRESS Framework v9.0.
About These Use Cases
These sample assessment reports demonstrate the FORTRESS Framework's application across different compliance frameworks and organizational contexts. Each assessment follows the structured methodology defined in the FORTRESS Framework, ensuring comprehensive coverage of physical security controls while maintaining consistency and repeatability across engagements.
Key Features Demonstrated:
- Structured assessment methodology aligned with compliance requirements
- Comprehensive testing of physical access controls
- Detailed findings with severity classifications
- Actionable remediation recommendations
- Compliance mapping to specific control requirements
For more information about the FORTRESS Framework or to explore the interactive navigator, visit the Framework Navigator.