Sie sind auf Seite 1von 10

Data Center Security Policy

1. Background
1. Technological & Industry Challenge,
2. Industry standard & legal Requirement : SSAE 16, ANSI/TIA-
942, SOA,
3. Customer Requirement
2. Optimum Physical Security :
Layering

Security measures can be categorized


into four layer :
1. Perimeter security
2. Facility controls
3. Computer room controls
4. Cabinet controls
3. Inner layer also important :
Insider Threats

Think must do :
1. Track people
2. Limit unauthorized employee access to high-priority
areas
3. Provide an audit trail of personnel access
4. Integrate with video to provide a record of an
attempted breach.
4. First Layer :
Perimeter Security
The primary goals of the first layer of data center protection—perimeter
security—are the three D’s: deter, detect and delay.

• Perimeter fence, gate & barriers


• Intrusion detection system
• Security guard
• Limited access control point
• CCTV
• Networks security system
• Instant access to Police Call Center
5. Second Layer :
Facility Controls

The goals of this secondary layer of protection are to further restrict access if a
breach has occurred at the perimeter. Indoor surveillance for identification and
monitoring, as well as multiple ID verification methods are a must.

• Visitor management system


• High Definition CCTV
• Controlled door lock & clearance
• Multi level indoor security zone and security level area
• Integrated access control, Fire system & instruction system
6. Third Layer :
Computer Room Controls

The goals of the third layer of physical security are to further restrict
access through multiple forms of verification, monitor all authorized
access, and have redundant power and communications.

• Restriction access to computer rooms, by :


• Standard individual access policy in all area
• Deploying entry restrictions such as turnstiles, Video Content Analysis, biometric access
control devices, radio-frequency identification (RFIDs) and environmental monitoring

• According to the Chemical Facility Anti-Terrorism (CFAT) performance standards for a Tier 1 facility,
the identity verification system should be “vigorous,” and “all unescorted personnel are issued
electronic photo ID badges that are integrated with the facility’s access control system”

• the SSAE16 auditing requirements state that access to all entry points into and within the data
center should be protected by electronic access control mechanisms that allow only authorized
individuals to enter the facility.
7. Fourth Layer :
Cabinet Controls

The fourth layer of data center physical security further restrict access and continue to
work within an integrated systems framework. Security measures to achieve this include
cabinet-locking mechanisms, audit trails and an intelligent infrastructure strategy

Some key considerations for that critical fourth layer:


• Reliable electronic locking systems for server cabinets
• Integrated security access witch upper layer
• Logging & monitoring
• Networked High definition CCTV featured tilt & pan steering
• Fire suppression system integrated with environmental monitoring
system and instruction system
8. Summary
• No need to create own standard & policy > simply ratify the
standards, redo the best practice
• Implementation based on Tier Objective and Customer
Requirement
• Certification is a must, followed by regular audit and regular
practice/simulation.
Thank You

Das könnte Ihnen auch gefallen