Precursor Security
Physical Security Testing

Physical Penetration Testing

An attacker does not need to bypass your firewall if they can follow a staff member through the door. We attempt to breach your facilities using the same techniques as real intruders, and show you exactly what they would find inside.

Access Control Testing
Social Engineering
Tailgating Tests
Audit-Ready Reporting
Scroll
Physical Security Risk Profile

The Physical Security Risk Gap

Most organisations have never independently verified their physical security controls. An untested access control is a liability you own personally, and the only way to quantify that risk is to test it under controlled conditions.

Critical
71%

Tailgating Success Rate

Of physical penetration testing attempts via tailgating succeed on first approach. Most organisations have never independently verified this figure.

High Risk
68%

Server Room Access Achieved

Of Precursor physical assessments result in access to a server room, network cabinet, or domain-connected device within the agreed engagement window.

Fixed Price
£5,000

Single-Site Assessment

Fixed-price physical penetration test including on-site assessment, photo evidence pack, written report, compliance mapping, and debrief call.

Mapped
Controls
ISO 27001Annex A.11
PCI DSSRequirement 9
DORAArticle 9
SOC 2Physical Access
Audit vs Pentest

Prove Your Controls Work, Not Just That They Exist

A physical security audit checks your documentation. A physical penetration test checks your doors. Auditors increasingly require evidence of active control testing, not just policy compliance.

Physical Security Audit

Paper-Based Review

Reviews policies and procedures only
No active testing of controls
Cannot prove tailgating is detectable
No evidence of alarm response times
Insufficient for ISO 27001 recertification
Competitors and attackers test in practice
Physical Penetration Test

Adversarial Simulation

Active bypass of doors, guards, and barriers
Tailgating, badge cloning, and pretexting tested
Server room and network port access attempted
Alarm response times measured under real conditions
Photo evidence pack for auditor and board
Findings mapped to ISO 27001, PCI DSS, and DORA
Methodology

Physical Security Testing Methodology:
From the Perimeter to the Server Room

Delivered by CREST-accredited consultants who also conduct internal network penetration testing. We know what an attacker does after they get through the door, because we test that too.

Access Control

Access Control Bypass

Testing the effectiveness of your turnstiles, maglocks, and pass-back sensors. We use HID iCLASS-compatible readers and Proxmark-based RFID cloning to duplicate active access badges from up to 30cm, and test REX sensor exploitation to defeat tailgating prevention systems.

Pretexting

Social Engineering & Pretexting

Using convincing cover stories to gain access without proper authorisation. Pretexts are scenario-specific and agreed during scoping: common scenarios include facilities contractor, fire safety inspector, IT support attending a helpdesk ticket, and vendor delivery.

Network Access

Network Jack Exploitation

Once inside, we identify 802.1X bypass opportunities and assess whether VLAN hopping is possible from guest or meeting room ports, testing the boundary between physical presence and full internal network access.

Lock Bypass

Lock Picking & Physical Bypass

Non-destructive testing of physical locks, latches, and padlocks. Techniques include single-pin picking, bump keys, shimming, and latch bypass (loiding). Server rack padlocks, fire door crash bars, and restricted access stairwells are all in scope if agreed.

Evidence

Clean Desk Audits

We photograph and document any unattended credentials, sensitive documents, or unlocked screens, producing an evidence pack suitable for a disciplinary or policy review process, and formatted for auditor submission under ISO 27001 Annex A.11 controls.

Surveillance

Surveillance & Alarm Evasion

Mapping CCTV blind spots, PIR sensor coverage gaps, and alarm response times. We test whether your electronic security systems detect and respond to physical intrusion attempts, documenting the gap between assumed coverage and actual detection capability.

Auditor Ready

Physical Penetration Testing for Compliance

Physical security controls are required by every major security framework. Our assessment provides documented evidence for auditors, formatted as a compliance mapping table aligned to each standard.

ISO 27001

Annex A.11

Physical and Environmental Security: independent verification of physical access controls required for certification

PCI DSS

Requirement 9

Restrict Physical Access to Cardholder Data: physical penetration testing validates controls over data environments

DORA

Article 9

ICT physical resilience for financial entities: operational resilience requires verified physical access controls

Cyber Essentials+

Physical Controls

Physical access control verification is assessed as part of the Cyber Essentials Plus on-site audit process

SOC 2 Type II

Physical Access

Service organisations must evidence that physical access is restricted, monitored, and independently tested

Cyber Insurance

Policy Req.

Many UK insurers now require evidence of physical security testing as part of their underwriting criteria

CREST

Globally Accredited Consultants

All physical penetration tests are delivered by CREST-accredited consultants.

Verify Accreditation
Engagement Pipeline

Physical Penetration Testing Process

A structured four-stage operation, from initial reconnaissance to final debrief and remediation guidance.

Step 01

Reconnaissance

We observe your facility from the outside to identify staff patterns, smoking areas, delivery schedules, and weak points in the perimeter. OSINT and physical site observation are combined to map entry vectors.

OutputSite Assessment Brief
Step 02

On-Site Entry Attempts

Our consultants attempt to gain entry during business hours (blending in with staff) or after hours (testing alarm response), depending on the agreed Rules of Engagement. Every access attempt is documented.

OutputAccess Log
Step 03

Objective Testing

Once inside, we attempt to achieve the agreed objectives: accessing the server room, planting a rogue device, photographing confidential material, or identifying exposed network ports.

OutputPhoto Evidence Pack
Step 04

Debrief & Reporting

A complete timeline of how access was gained, which controls failed, and a photo evidence pack with timestamps and annotations. Every finding mapped to compliance controls.

OutputAudit-Ready Report
Attack Chain

Physical Access to Domain Compromise

A physical penetration test does not end at the door. We test the full escalation path: from building entry through network access to digital compromise. Domain administrator access is regularly achieved within four hours of building entry.

Phase 1

Building Entry

Tailgating through a staffed entrance, badge cloning via Proxmark RFID reader, or social engineering pretext gains physical access to the facility.

Phase 2

Network Access

An exposed network port in a meeting room gives an intruder full internal network access. 802.1X bypass or a rogue device planted on the network.

Phase 3

Digital Compromise

From internal network access to Domain Admin within hours. Every firewall and endpoint control is bypassed entirely by physical presence on the LAN.

Deliverables

What You Receive

Every physical penetration test includes the following deliverables, formatted for both technical teams and non-technical board-level stakeholders.

Executive Summary with access timeline, success rates, and control failure analysis
Technical Findings Report with severity ratings, MITRE ATT&CK mapping, and remediation guidance
Photographic Evidence Pack with timestamped images, location annotations, and technique descriptions
Compliance Mapping Table aligned to ISO 27001 Annex A.11, PCI DSS Req 9, and DORA Article 9
Clean Desk Audit Results with policy violation evidence and departmental breakdown
Network Exposure Assessment documenting any accessible network ports and 802.1X bypass findings
Prioritised Remediation Recommendations with implementation guidance and retest criteria

Reports delivered within five working days via encrypted portal. Available in PDF format, suitable for direct submission to ISO 27001 auditors, PCI QSAs, and board stakeholders.

Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Ready to Secure

The best time to test your defences is now.

Join the high-growth companies relying on Precursor for continuous offensive and defensive security.

CREST Triple Accredited|Fixed Price Quotes|Free Scoping Call|UK Based Team

Frequently Asked Questions

Common questions about this service, methodologies, and deliverables.

Physical penetration testing is the active assessment of physical security controls. Instead of hacking a firewall, our consultants physically attempt to bypass doors, guards, and locks to enter your building and access sensitive areas such as server rooms or executive offices. Unlike a physical security audit, which reviews documentation, a physical penetration test actively proves whether your controls work in practice.

Safety is our priority. We use non-destructive entry methods throughout. We do not break windows or force doors. We operate under strict Rules of Engagement and consultants carry authorisation letters signed by your leadership throughout the engagement.

Getting caught is a successful test result. It means your staff or security team are vigilant. If challenged, our consultants present their authorisation letter and contact your designated point of contact to verify the exercise. All incidents are logged and included in the final report.

Yes. We can simulate after-hours intrusion to test intruder alarms, response times, and overnight physical controls, or conduct daytime assessments to test staff vigilance against tailgaters and social engineering pretexts. Scope is agreed during the scoping call.

Digital security controls are bypassed entirely once an attacker gains physical access to your building. An exposed network port in a meeting room gives an intruder full internal network access within minutes, regardless of your firewall or endpoint security spend. Physical penetration testing in the UK is increasingly required for ISO 27001 certification and PCI DSS compliance.

Yes. We conduct multi-site physical penetration testing programmes for retail chains, banks, and logistics companies to benchmark physical security across branches and regional offices. Multi-site engagements are scoped individually with fixed pricing per site.

Physical penetration testing starts from £5,000 for a single-site assessment. The fixed price includes on-site assessment time, a written findings report with photo evidence pack, compliance mapping, and a debrief call. Multi-site programmes and engagements with extended out-of-hours testing are scoped individually. Contact us for a fixed-price quote scoped to your specific sites and objectives.

Yes. ISO 27001 Annex A.11 (Physical and Environmental Security) requires that physical security controls are implemented and independently verified. Our physical penetration testing provides documented evidence of control testing suitable for ISO 27001 auditors, including findings mapped to specific Annex A.11 controls, severity ratings, and remediation recommendations. We also provide compliance mapping for PCI DSS Requirement 9 (physical access to cardholder data environments).

A physical security audit reviews your policies, procedures, and controls documentation against a standard: it is a paper-based review. A physical penetration test actively attempts to bypass those controls in practice: it is an adversarial simulation. Audits tell you what controls you have written down; penetration testing tells you whether those controls actually work. For ISO 27001 certification, auditors increasingly require evidence of active control testing, not just policy documentation.

Our physical penetration testing methodology follows a structured four-stage approach: reconnaissance (OSINT and physical observation of the site), entry attempts (tailgating, badge cloning via Proxmark-based RFID readers, social engineering pretexts, lock bypass including single-pin picking, bump keys, and latch bypass), objective testing (server room access, rogue device placement, clean desk audit, network jack identification and 802.1X bypass assessment), and debrief (full timeline report with photo evidence and remediation guidance). All engagements operate under agreed Rules of Engagement and consultants carry authorisation letters throughout.