Physical Security Architecture
The Builder's View
The builder constructs the physical system. The designer of the building hands over the work process to the builder. The builder is someone who can take the logical descriptions and drawings and turn these into a technology model that can be used to construct the building. It is the builder's job to choose and assemble the physical elements that will make the logical design come to life as a real construction. This view is therefore also referred to as the 'physical security architecture' (Sherwood, Clark, & Lynas, 2005).
​
In the world of business information systems, the designer produces a set of logical abstractions that describe the system to be built. These need to be turned into a physical security architecture model that describes the actual technology model and specifies the functional requirements of the various system components. The logical security services are now expressed in terms of the physical security mechanisms and machines that will be used to deliver these services (Sherwood, Clark, & Lynas, 2005).
​
In total, the physical security architecture is concerned with:
​
What? Specifying the business data model and the security-related data structures (tables, messages, pointers, certificates, signatures, etc.);
​
Why? Specifying rules that drive logical decision-making within the system (conditions, practices, procedures and actions);
​
How? Specifying security mechanisms (encryption, access control, digital signatures, virus scanning, etc.) and the physical machines upon which these mechanisms will be hosted;
​
Who? Specifying the people dependency in the form of the users, the applications that they use and the security user interface (screen formats and user interactions):
​
Where? Specifying security technology infrastructure (physical layout of the hardware, software and communications lines);
​
When? Specifying the time dependency in the form of execution control structures (sequences, events, lifetimes and time intervals) (Sherwood, Clark, & Lynas, 2005).
​
Source:
​
Sherwood, J., Clark, A., & Lynas, D. (2005). The Builder's View. In J. Sherwood, A. Clark, & D. Lynas,
Enterprise Security Architecture (pp. 38-39). San Francisco: CMP Books.
​