Sie sind auf Seite 1von 18

Security and Surveillance

System

Syndicate 10
Importance
 CardSystems Solutions, top payment processors, data
breach exposed 40 million credit card accounts. The
incident force the company out of business.
 Heartland Payment Systems, provider of credit and
debit processing was the victim of a data breach. largest
ever, with 100 million records potentially affected.
 Security Breaches Cost $90 To $305 Per Lost Record
 More than one-half (55%) of midmarket and enterprise
organizations will increase their spending on
information security products and services in 2010
3 critical security areas
 Physical Security - includes locking
down and logging all physical access
to servers at our data center.
 Operational Security - security
involves creating business processes
that follow security best practices to
limit access to confidential
information and maintain tight
security over time.
 System Security - involves locking
down customer systems from the
inside, starting with hardened
operating systems and up-to-date
patching
Physical Security
 Three levels of access authentication
 First Level: Manned security 24 X 7.
 Second Level: Authentication based on access cards.
 Third Level: Biometrics scan, the area with hosted
servers are caged for additional security.
 Surveillance Cameras with Digital Video
Recorder
 Video searches by event, time, date and camera
 Remote access to security footage
Physical Security

 Fire Security
 Fire resistant tiles
 Fire Retardant Doors and Glasses
 Second Level Of Risk Mitigation
 VESDA (Very Early Smoke Detection Apparatus)
 FAS (Fire Alarm System)
 GAS Suppression FM200 (For Fire Suppression)
 Other Security Measures
 WLD (Water Leak Detection)
 Pest Repellent
 Rodent Triple Agent
Consider Who Has Access to Sensitive Data

Network Storage Outsourcing


Administrators Administrators Vendors
CEO
Customer
Customer Storage
Data
Data

Intellectual
Intellectual
Property
CFO Property

Salaries
Salaries
and
and
Reviews DR Storage
Reviews Storage Repair/
Administrators
Litigation
Service Staff
Litigation
Docs
Docs
General
Counsel Tape
Courier
System Backup
Administrators Administrators
System Security
Data Center Security Threats
 Intrusion Threats

 DDoS – Denial of Service

 Worms and Outbreaks

Data Center Security Technology


 Access Control

 Firewall and Intrusion Prevention (IPS)

 DDoS Detection and Mitigation

 Outbreak Prevention

 Security Management
Threats for a Data Center
Physical Security Methods
for Data Centers

Location for building a Data Center:

 Away from Highway, Air port, Powerhouse,


Chemical Factories, Petro pipelines.

 Not in the earthquake fault lines, areas prone to


floods and Hurricanes.
While Building a Data Center:

 Make outer walls made up of concrete and a foot thick at least


 Avoid windows in the walls
 At least 100 feet buffer land around the data center with trees preferably
 One front main entrance/exit and one main back entrance/exit
 Make fire exit doors with ‘exit only’ type of doors
 Air-conditioning systems can be set to re circulate air rather than drawing in air
from the outside. This could help protect people and equipment if there were
some kind of biological or chemical attack
 Make a visitors room outside with the rest room attached, for delivery people
and other visitors
Access control in operational stage of Data
Center.
 A guard post at both the entrance.
 Barbed fence wire over the outer most wall.
 Access in data center to me multi layered, it means
checking and rechecking at three places before entering
the data center.
 For example
1st layer could be of swiping cards.
2nd layer of pin code enter
3rd layer of biometric either finger print or retinal scan.
This could be one of the layout for a Data Center
Security and Surveillance of Data center through Sensors
Sensor Placement
Aggregator of Sensor Data

Das könnte Ihnen auch gefallen