The unimaginable just happened. Your server room has been breached, critical data systems compromised, and costly equipment missing. Despite an investigation revealing when and how someone gained unauthorized access, the damage is done. The incident caused a significant ripple throughout the organization, highlighting the need for updated security protocols that are frequently tested against potential real-world breaches.

Security just met reality.

What is onsite penetration testing?

Onsite penetration testing, also known as physical pen testing and red teaming, is a proactive security measure to help identify and fortify against such breaches. Simply put, the objective is to uncover potential vulnerabilities before they are exploited by malicious actors.

“In a physical onsite penetration test we're trying to exploit those gaps, areas that may have weaknesses. The intent of the pen test is to highlight these shortcomings in a facilities program to help clients mitigate those gaps, and then close the circuit, if you will, to have a stronger security program,” Chris Phillips, Director, Pinkerton Global Investigative Unit.

Understanding onsite penetration testing and its role in comprehensive security assessments

Onsite penetration testing is a specific and strategic approach used to gauge the efficacy of a facility’s physical security measures. Unlike cyber penetration testing that targets software vulnerabilities and network weaknesses, onsite pen testing aims to identify lapses in the physical barriers and control mechanisms.

“These tests often simulate the tactics used by bad actors, such as unauthorized entry, tailgating, and social engineering techniques, to see how well a facility’s security measures hold up,” said Chris. “This can encompass testing a variety of systems like locks, access control systems, surveillance cameras, alarm systems, and even the awareness of the staff.”

Balancing cybersecurity and physical security in your organization

“Physical security addresses tangible threats with visible deterrents, while enterprise cybersecurity tackles digital risks with continuous, proactive measures. Each requires distinct skills and approaches,” said Chris.

While many organizations focus heavily on cybersecurity, physical security is sometimes overlooked. However, a breach in physical security can often lead to a compromise in data security. For instance, unattended workstations left logged in pose a risk for data theft, or unauthorized access to a data center can lead to direct manipulation of servers, potentially bypassing layered digital security measures.

However, this is not the only way to gain unauthorized access to data. Bad actors may attempt to breach a facility to plant surveillance equipment, such as small, wireless video cameras that could give them insider information about data centers or direct views of security systems and passwords.

Bad actors might also attempt to gain unauthorized access into the facility of a targeted organization to leave something as simple as a USB drive — labeled as "confidential," "salary info," or “layoffs” — in a place where it's likely to be found by an employee of that organization. This is a social engineering tactic known as baiting. Curious, an employee could pick up the USB drive and plug it into a computer to see its content. The drive contains malware, which is then automatically installed on the computer, providing the infiltrator with access to the company's network.

“A comprehensive security program should be a blend of digital and physical security measures. Physical security penetration testing is an invaluable tool for ensuring that the latter is robust and effective,” said Chris.

What are the differences between onsite physical pen testing and cybersecurity pen testing?

While Pinkerton does not conduct cyber penetration tests, onsite physical pen testing, and digital pen testing each play a role in comprehensive security assessments and contribute to a well-rounded security posture by offering distinct focus areas, methodologies, and objectives. By understanding the unique characteristics of cybersecurity and pen tests, organizations can enhance their overall security posture.


Onsite penetration testing

Focus Area: Targets and covertly tests physical infrastructure like gates, doors, locks, CCTV cameras, and employee behavior.

Methodology: Involves on-site testing, often simulating criminal activities like breaking and entering, tailgating, or social engineering tactics.

Objectives: The objective is to expose flaws in physical security measures and human factors.

Skill Sets: Requires a diverse set of skills including social engineering and physical intrusion techniques.


Digital penetration testing

Focus Area: Focuses on software vulnerabilities, network architecture, and digital assets. It aims to exploit these vulnerabilities to understand their implications.

Methodology: Conducted remotely or on-site, this involves probing networks, systems, and applications to find exploitable vulnerabilities. These tests are conducted by “white hat” hackers.

Objectives: Aims to identify security weaknesses in software and hardware systems that can be exploited digitally.

Skill Sets: Requires expertise in software, networking, and possibly even specific programming languages.


Pen testing key objectives

“An organization’s primary security goal is to establish a comprehensive, enterprise-wide physical security program, which can differ from location to location based on various factors. However, the most critical aspect is to have a program in place,” said Chris. “Then it’s essential to assess the risk associated with each asset, whether it’s a building, a room, or critical infrastructure, based on factors like location, historical incidents, and asset value. This helps in prioritizing which areas need more focus during testing.”

The key objectives of physical security penetration testing vary depending on the specific needs and focus areas of an organization, but they can be grouped into several core goals:

  • Identify vulnerabilities: The primary objective is to identify weak points in physical security measures, which could include poor-quality locks, unsecured access points, ineffective surveillance, or lax personnel practices.
  • Evaluate current measures: Assess how well current security protocols, tools, and infrastructure are functioning. This includes understanding if staff are well-trained to handle security incidents and if security systems like alarms and CCTV are fully operational and effective.
  • Regulatory compliance: Ensure that the physical security measures meet the standards and requirements set by industry as well as local, state, regional, and federal regulatory bodies. For entities handling sensitive or classified information, regulatory compliance isn't just recommended — it's mandatory.
  • Employee awareness: Gauge the level of security awareness among employees. Are they trained to question or report unfamiliar individuals? Do they know what to do if they see someone tailgating through a secure door? Ongoing employee training and heightened awareness can establish a security culture that proactively addresses potential threats.
  • Risk assessment: Offer a comprehensive view of the risks the organization faces in its physical environment, which aids in future security planning and risk mitigation strategies. (Learn more about site vulnerability assessments.)
  • Recommend improvements: Provide actionable recommendations for enhancing the existing security measures. This could include anything from upgrading physical hardware to retraining staff or even modifying the layout of a facility to reduce risks. (See how Crime Prevention Through Environmental Design (CPTED) can deter crime and unauthorized access to facilities.)
  • Test incident response: Determine how effectively and swiftly the organization can respond to a security incident. By conducting regular drills, employees will know what to do in case of an emergency and can react quickly and calmly. This can help in refining emergency procedures and training programs and highlight unforeseen gaps in security programs.
  • Cost-benefit analysis: Through testing, offer insights into where financial resources would be most effectively spent. For example, are expensive biometric systems worth the investment, or could a simpler upgrade provide comparable security? (For a deep look, request an ROI Analysis.)

“Not all vulnerabilities are created equal,” stated Chris. “Some may pose a direct, immediate risk to critical assets, while others are less urgent. We can work with clients after pen tests to prioritize vulnerabilities and focus remediation efforts where they are most needed.”

Balancing digital and physical security is essential for comprehensive organizational protection. Ignoring physical security can lead to severe consequences like data breaches and theft. Regular onsite penetration testing helps identify and rectify these security lapses.

Ultimately, a well-rounded, proactive security program is vital. Onsite penetration testing is a key part of this approach, uncovering security flaws, and assisting in regulatory compliance and resource allocation, with the overall goal of strengthening and achieving organizational resilience.

Connect with Pinkerton’s Investigations team to learn more about pen testing and how it can help your organization. Know your risk. Be safe.

Contributed by Chris Phillips

Published November 30, 2023