SlideShare a Scribd company logo
1 of 4
Download to read offline
CurbtoCore:
BestPracticesforData
CenterPhysicalSecurity
Put simply, data drives our economy.
From healthcare to higher education,
from finance to bioscience, data is
critical to the success of organizations in
every industry. What we do and how we
support the functions of data collection,
storage and the absolute need to keep
that information secure grows more
critical every day.
Keeping that data secure is not a one-
size-fits-all proposition. That’s why
it’s necessary to thoughtfully assess
your current and future needs before
you allocate your budget and deploy
a program to secure critical assets. To
maximize the investment in physical
security, consider each section of
the facility from the perimeter of the
property to the center of the facility
where the server racks are housed. This
“curb to core” approach demonstrates
effective physical security measures that
complement the fundamental business
operations of the data center.
In this constantly evolving market,
facility managers need to be aware of
new physical security options and best
practices for securing data and data
facilities. Whether you’re a company
looking to evaluate a data center, or a
data company looking to upgrade and
improve their security, we’ll discuss some
of the codes and requirements from
major organizations along with important
considerations for each facility layer, from
curb to core.
Protecting Different Types
of Data Centers
As a facility manager, you know that most
data centers fit into one of three broad
categories.
The enterprise data center essentially
serves as the backbone of the corporation.
Sites for these types of data centers are
generally selected based on cost factors;
they tend to be located where land and
connectivity are the cheapest or where
existing business operations can provide
the needed space and infrastructure.
Most of these sites have existing physical
security measures and practices in place
that can offer a starting point to “bolt on”
the needs of the data center space.
The second type is the co-location or
“colo” data center. These facilities provide
a range of data management services for
their clients or tenants. When it comes
to security, the co-location facility can be
particularly challenging in that competing
entities could very well find themselves
storing important data across the hall,
in the cage adjacent to, or even within
the same cage as one another. Keeping
each client’s needs represented and
fundamentally separate is demonstrated
by the need and value of security all the
way to the server rack cabinet.
The third type, known as a blended or
distributed model, is most common
among large corporations. True to
its name, the “distributed model” is
characterized by the use of space owned
or leased by the entity that needs it.
By Chris Hobbs
Oftentimes, the rental of external space
can be a short-term solution as the
company constructs additional buildings
of its own, at which point the storage is
brought back under the corporate roof.
Obviously, the blended model responds
to the ever-changing needs of rapidly
expanding online companies, utility or
infrastructure providers. The fact that
data is being stored in different facilities
requires a more thorough approach to
physical security.
Standards and Codes
Depending on the industry of the data
center user, the access control solution
must satisfy thorough and specific
compliance requirements. Three
important examples of these regulations
are outlined below.
Health Insurance Portability and
Accountability Act of 1996 (HIPAA):
HIPAA Title II includes an administrative
simplification section that deals with
the standardization of health care
information systems. In the information
and communications technology
(ICT) industries, this section is what
most people mean when they refer
to HIPAA. The Act seeks to establish
standardized mechanisms for electronic
data interchange security and the
confidentiality of all health care data.
HIPAA mandates standardized formats
for:
• All patient health, administrative and
financial data.
• Unique identifiers (ID numbers for each
health care entity, including individuals,
employers, health plans and health
care providers).
• Security mechanisms to ensure
confidentiality and data integrity for
any information that identifies an
individual.
Payment Card Industry Data Security
Standard (PCI DSS): The PCI DSS is
a widely accepted set of policies and
procedures intended to optimize the
security of credit, debit and cash card
transactions and protect cardholders
against misuse of their personal
information. It requires that access to
system information and operations
be restricted and controlled and that
cardholder data is protected physically
and electronically.
North American Electric Reliability
Corporation (NERC): Five of NERC’s nine
mandatory CIP (Critical Infrastructure
Protection) standards are important
to consider when managing your data
center security:
CIP-003: Requires that responsible
entities have minimum-security
management controls in place to protect
Critical Cyber Assets;
CIP-004: Requires that personnel with
authorized cyber or unescorted physical
access to Critical Cyber Assets, including
contractors and service vendors, have
an appropriate level of personnel risk
assessment, training, and security
awareness;
CIP-005: Requires the identification and
protection of the Electronic Security
Perimeters inside which all Critical Cyber
Assets reside, as well as all access points
on the perimeter;
CIP-006: Addresses implementation
of a physical security program for the
protection of Critical Cyber Assets;
CIP-007: Requires responsible entities
to define methods, processes, and
procedures for securing those systems
determined to be Critical Cyber Assets,
as well as the other (non-critical) Cyber
Assets within the Electronic Security
Perimeters.
The common thread across all these
regulatory requirements is the need
for proper security (both physical and
electronic) to ensure the safety of data.
While the various regulations mandate
data protection, they do not prescribe
CurbtoCore: BestPracticesforDataCenterPhysicalSecurity-continued
“What we do and how we
support the functions of
data collection, storage
and the absolute need
to keep that information
secure grows more
critical every day.”
the path to achieve this goal. As a result,
it
is critical for data center professionals
to have a thorough understanding of
applicable compliance requirements so
they can identify the best solutions and
policies for their organizations.
Securing the Perimeter
Regardless of the type of data center,
physical protection begins at the
perimeter. A berm of dirt or land, for
example, can be created to establish a
physical barrier that prevents vehicles
driving on the property. With permission
of local jurisdictions, the physical security
solution can begin with landscaping,
high-security fencing or a combination
of the two. High security perimeter
solutions from Ameristar include top-
of-the-line steel fencing with anti-ram
barriers, designed to withstand multiple
vehicle threats.
Within the fencing is an ideal spot
for exceptionally sensitive intrusion
detection systems, or IDS. These systems
use a variety of technologies such as
lasers to detect movement across the top
of the fence and then generate an alert
when someone tries to cross, or wire
tension sensors to alert when someone
attempts to scale a fence.
Main Entrance
The next layer is the main entrance to
the facility, which is typically a vestibule
housing the visitor management and
access control functions. In some cases
this includes a mantrap. This space
is a neutral zone where the visitor or
employee is out of the weather but
still needs to be qualified before being
granted access to the building, a step that
requires accompaniment by authorized
personnel or evidence of access rights
such as a credential. Typically a mantrap
includes an electrified deadlatch, such as
the 4300 Steel Hawk from Adams Rite,
which combines mechanical locking
hardware with electrified access control
while working within standard aluminum
entrance door preparation.
Interiors
Next is the interior, where conference
rooms, managerial offices and an array
of general purpose space requires
different types of physical security
measures. Securitron offers a variety
of entry devices, particularly the R100
surface mounted wireless reader and
Aperio hub, which brings access control
to entryways with fully encrypted AES
128 communication and audit trail
capabilities.
These areas are separate from the data
center floor and often house other
large equipment such as batteries and
generators, which are mission-critical to
protect data during power outages. The
openings into these spaces are generally
oversized and therefore require specialty
doorframes and hardware. Ceco offers
an RF shielded door and frame that
prevents outside interference, ensuring
that sensitive and confidential data is
contained. These openings guarantee a
high level of durability, thickness, blast
resistance and gasketing to prevent
fumes from escaping.
Critical Infrastructure Space
The next layer enters the very core of the
building. When it comes to protecting
the servers and the infrastructure that
supports their operation, there must be
a durable, proven access control solution
in place. Often a biometric reader is
employed to identify people based on
their hand geometry, fingerprints or
irises as a method of dual authentication
aside the traditional card access system.
Cages are generally associated with
co-locations. If a client rents a 10-foot-
by-10-foot space, he will almost certainly
expect that space to be physically
separated from the spaces rented by
other clients. The cages offer six-side
CurbtoCore: BestPracticesforDataCenterPhysicalSecurity-continued
protection and are usually protected by
a combination of biometrics, Securitron
maglocks, and card access. Client
business models generally drive security
deployment at this level to ensure
regulatory compliance.
Servers
The server cabinets are the last stop. This
is an area with security options ranging
from relatively simple locks to advanced
access control solutions with audit trail
capabilities.
To protect the data held within each
server rack, HES offers the KS100 server
cabinet lock and Aperio hub. If there is
an existing access control system, the
Aperio hub ties in directly, bringing real-
time access control to each cabinet in a
single-card system. This wireless solution
greatly improves the monitoring and
security level of each server cabinet. It
uses existing ID badges so there are no
keys to control or replace and no codes
to secure or remember.
If a hardwired solution is required,
HES offers the KS200 server cabinet
lock that uses Wiegand wiring to
integrate seamlessly with any existing
access control and ID badge system.
Both options support a Small Format
Interchangeable Core (SFIC) key override
and provide robust, cost-effective access
control that meets strict regulatory
compliance and protects data. Both
the KS100 and KS200 have the added
capability of extending their impact to
include three contact points that are
commonly used to monitor the side
panels of the racks, providing a central
point for the communication back to
the access control platform. This not
only extends the value and impact of the
access control device but also lowers the
cost of deployment versus traditional
installations.
There is also the option of enhancing
the KS200 by removing the mechanical
override and replacing it with a
Medeco XT electronic cylinder for a
full accountability solution. Since data
centers are indeed critical, and need
more than what a mechanical solution
can offer, there is also the XT Intelligent
Key System that provides scheduling,
audit and ability to expire keys thereby
increasing accountability and security.
The products selected will depend
in large part on the way the servers
are arranged in the space. With either
an open room with many rows of
server racks or a hot aisle or cold aisle
configuration there are operational
and environmental challenges. In either
scenario, the HES KS100 and KS200, with
a Medeco XT Intelligent Key System as
well as the Securitron R100, are optimal
solutions.
Best Practices
It is important that protocols are in place
not just for data security but also for life
safety and good business practices. In
fact, when procedures are not developed
or deployed, it creates significant
vulnerabilities for the organization.
Like other facets of facility management,
execution is paramount. Several
organizations, including BICSI, the
Federal Emergency Management Agency
and ASIS International, offer guidance in
the development and management of
security protocols.
Regardless of the type of data center
you’re managing, the advances made in
this field make it possible to offer higher
levels of security from the perimeter
through to the server cabinet itself as
a competitive advantage. In nearly any
industry, companies will pay a premium
to protect their critical data.
Chris Hobbs is Business Development
Leader, Data Centers at ASSA ABLOY Door
Security Solutions. He can be reached at
Chris.Hobbs@assaabloy.com.
CurbtoCore: BestPracticesforDataCenterPhysicalSecurity-continued

More Related Content

What's hot

Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspectiveCraig Mullins
 
Best Practices for PCI Scope Reduction - TokenEx & Kyte
Best Practices for PCI Scope Reduction - TokenEx & KyteBest Practices for PCI Scope Reduction - TokenEx & Kyte
Best Practices for PCI Scope Reduction - TokenEx & KyteTokenEx
 
Information Assurance in an Enterprise Hosting Environment
Information Assurance in an Enterprise Hosting EnvironmentInformation Assurance in an Enterprise Hosting Environment
Information Assurance in an Enterprise Hosting Environmentwebhostingguy
 
Information Asset Management...Comply for less!!
Information Asset Management...Comply for less!!Information Asset Management...Comply for less!!
Information Asset Management...Comply for less!!Geoff Broome
 
PCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline CompliancePCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline ComplianceTokenEx
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentialsCraig Mullins
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data securityUlf Mattsson
 
Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011Jonathan Sinclair
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)TokenEx
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 
C7 defending the cloud with monitoring and auditing
C7   defending the cloud with monitoring and auditingC7   defending the cloud with monitoring and auditing
C7 defending the cloud with monitoring and auditingDr. Wilfred Lin (Ph.D.)
 

What's hot (19)

Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
Best Practices for PCI Scope Reduction - TokenEx & Kyte
Best Practices for PCI Scope Reduction - TokenEx & KyteBest Practices for PCI Scope Reduction - TokenEx & Kyte
Best Practices for PCI Scope Reduction - TokenEx & Kyte
 
Information Assurance in an Enterprise Hosting Environment
Information Assurance in an Enterprise Hosting EnvironmentInformation Assurance in an Enterprise Hosting Environment
Information Assurance in an Enterprise Hosting Environment
 
Information Asset Management...Comply for less!!
Information Asset Management...Comply for less!!Information Asset Management...Comply for less!!
Information Asset Management...Comply for less!!
 
PCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline CompliancePCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline Compliance
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data security
 
Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Dstca
DstcaDstca
Dstca
 
C7 defending the cloud with monitoring and auditing
C7   defending the cloud with monitoring and auditingC7   defending the cloud with monitoring and auditing
C7 defending the cloud with monitoring and auditing
 
Michael Kaishar Pci Dss Power Point Presentation
Michael Kaishar Pci Dss Power Point PresentationMichael Kaishar Pci Dss Power Point Presentation
Michael Kaishar Pci Dss Power Point Presentation
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 

Viewers also liked

Zmiany w Zarządzie BPSC SA
Zmiany w Zarządzie BPSC SAZmiany w Zarządzie BPSC SA
Zmiany w Zarządzie BPSC SABPSC
 
Recurrent fuzzy neural network backstepping control for the prescribed output...
Recurrent fuzzy neural network backstepping control for the prescribed output...Recurrent fuzzy neural network backstepping control for the prescribed output...
Recurrent fuzzy neural network backstepping control for the prescribed output...ISA Interchange
 
Fiskus przyśpiesza uszczelnienie VAT: w grudniu będą kolejki?
Fiskus przyśpiesza uszczelnienie VAT: w grudniu będą kolejki?Fiskus przyśpiesza uszczelnienie VAT: w grudniu będą kolejki?
Fiskus przyśpiesza uszczelnienie VAT: w grudniu będą kolejki?BPSC
 
Plant-Wide Control: Eco-Efficiency and Control Loop Configuration
Plant-Wide Control: Eco-Efficiency and Control Loop ConfigurationPlant-Wide Control: Eco-Efficiency and Control Loop Configuration
Plant-Wide Control: Eco-Efficiency and Control Loop ConfigurationISA Interchange
 
Y-greki wierzą korporacjom
Y-greki wierzą korporacjomY-greki wierzą korporacjom
Y-greki wierzą korporacjomBPSC
 
Improved correlation analysis and visualization of industrial alarm data
Improved correlation analysis and visualization of industrial alarm dataImproved correlation analysis and visualization of industrial alarm data
Improved correlation analysis and visualization of industrial alarm dataISA Interchange
 
Programmable logic controller performance enhancement by field programmable g...
Programmable logic controller performance enhancement by field programmable g...Programmable logic controller performance enhancement by field programmable g...
Programmable logic controller performance enhancement by field programmable g...ISA Interchange
 
Distribution Management- Godrej Security Solutions
Distribution Management- Godrej Security Solutions Distribution Management- Godrej Security Solutions
Distribution Management- Godrej Security Solutions Sohil Ghoghari
 
Boron and Boron in Turkey
Boron and Boron in TurkeyBoron and Boron in Turkey
Boron and Boron in TurkeypWWol
 
Fast dissolving oral films
Fast dissolving oral filmsFast dissolving oral films
Fast dissolving oral filmsJagadeesh Babu
 
Albu_et_al-2014-Journal_of_Sleep_Research
Albu_et_al-2014-Journal_of_Sleep_ResearchAlbu_et_al-2014-Journal_of_Sleep_Research
Albu_et_al-2014-Journal_of_Sleep_ResearchStefana Albu
 
Urbanisation versus Restoration: The Struggles in Modern India
Urbanisation versus Restoration: The Struggles in Modern IndiaUrbanisation versus Restoration: The Struggles in Modern India
Urbanisation versus Restoration: The Struggles in Modern IndiaUddhavKedia
 
HT16 - DA156A - Introduktion till JavaScript
HT16 - DA156A - Introduktion till JavaScriptHT16 - DA156A - Introduktion till JavaScript
HT16 - DA156A - Introduktion till JavaScriptAnton Tibblin
 
HT16 - DA156A - Kursintroduktion
HT16 - DA156A - KursintroduktionHT16 - DA156A - Kursintroduktion
HT16 - DA156A - KursintroduktionAnton Tibblin
 
Introduction to ITsavvy
Introduction to ITsavvyIntroduction to ITsavvy
Introduction to ITsavvyPatrick Epps
 

Viewers also liked (20)

Zmiany w Zarządzie BPSC SA
Zmiany w Zarządzie BPSC SAZmiany w Zarządzie BPSC SA
Zmiany w Zarządzie BPSC SA
 
Recurrent fuzzy neural network backstepping control for the prescribed output...
Recurrent fuzzy neural network backstepping control for the prescribed output...Recurrent fuzzy neural network backstepping control for the prescribed output...
Recurrent fuzzy neural network backstepping control for the prescribed output...
 
Fiskus przyśpiesza uszczelnienie VAT: w grudniu będą kolejki?
Fiskus przyśpiesza uszczelnienie VAT: w grudniu będą kolejki?Fiskus przyśpiesza uszczelnienie VAT: w grudniu będą kolejki?
Fiskus przyśpiesza uszczelnienie VAT: w grudniu będą kolejki?
 
Plant-Wide Control: Eco-Efficiency and Control Loop Configuration
Plant-Wide Control: Eco-Efficiency and Control Loop ConfigurationPlant-Wide Control: Eco-Efficiency and Control Loop Configuration
Plant-Wide Control: Eco-Efficiency and Control Loop Configuration
 
Y-greki wierzą korporacjom
Y-greki wierzą korporacjomY-greki wierzą korporacjom
Y-greki wierzą korporacjom
 
Joining the Dots of Informality and Climate Change
Joining the Dots of Informality and Climate ChangeJoining the Dots of Informality and Climate Change
Joining the Dots of Informality and Climate Change
 
Improved correlation analysis and visualization of industrial alarm data
Improved correlation analysis and visualization of industrial alarm dataImproved correlation analysis and visualization of industrial alarm data
Improved correlation analysis and visualization of industrial alarm data
 
Programmable logic controller performance enhancement by field programmable g...
Programmable logic controller performance enhancement by field programmable g...Programmable logic controller performance enhancement by field programmable g...
Programmable logic controller performance enhancement by field programmable g...
 
Distribution Management- Godrej Security Solutions
Distribution Management- Godrej Security Solutions Distribution Management- Godrej Security Solutions
Distribution Management- Godrej Security Solutions
 
Boron and Boron in Turkey
Boron and Boron in TurkeyBoron and Boron in Turkey
Boron and Boron in Turkey
 
Fast dissolving oral films
Fast dissolving oral filmsFast dissolving oral films
Fast dissolving oral films
 
rankine cycle
rankine cyclerankine cycle
rankine cycle
 
Albu_et_al-2014-Journal_of_Sleep_Research
Albu_et_al-2014-Journal_of_Sleep_ResearchAlbu_et_al-2014-Journal_of_Sleep_Research
Albu_et_al-2014-Journal_of_Sleep_Research
 
100 Leaves copy
100 Leaves copy100 Leaves copy
100 Leaves copy
 
Urbanisation versus Restoration: The Struggles in Modern India
Urbanisation versus Restoration: The Struggles in Modern IndiaUrbanisation versus Restoration: The Struggles in Modern India
Urbanisation versus Restoration: The Struggles in Modern India
 
1. Rail Infrastructure - August 2014
1. Rail Infrastructure - August 20141. Rail Infrastructure - August 2014
1. Rail Infrastructure - August 2014
 
HT16 - DA156A - Introduktion till JavaScript
HT16 - DA156A - Introduktion till JavaScriptHT16 - DA156A - Introduktion till JavaScript
HT16 - DA156A - Introduktion till JavaScript
 
HT16 - DA156A - Kursintroduktion
HT16 - DA156A - KursintroduktionHT16 - DA156A - Kursintroduktion
HT16 - DA156A - Kursintroduktion
 
Introduction to ITsavvy
Introduction to ITsavvyIntroduction to ITsavvy
Introduction to ITsavvy
 
Plexus Sept Oct 2013
Plexus Sept Oct 2013Plexus Sept Oct 2013
Plexus Sept Oct 2013
 

Similar to Curb to core White Paper

Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix LLC
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutionsxband
 
What Is Data Center Security.pdf
What Is Data Center Security.pdfWhat Is Data Center Security.pdf
What Is Data Center Security.pdfCiente
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicCitrix
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityCitrix
 
What operational technology cyber security is?
What operational technology cyber security is?What operational technology cyber security is?
What operational technology cyber security is?sohailAhmad304
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfCiente
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for SuccessCitrix
 
Securing_Medical_Imaging_in_the_Cloud_Whitepaper
Securing_Medical_Imaging_in_the_Cloud_WhitepaperSecuring_Medical_Imaging_in_the_Cloud_Whitepaper
Securing_Medical_Imaging_in_the_Cloud_Whitepaperlaurenstill
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Managing sensitive applications in the public cloud
Managing sensitive applications in the public cloudManaging sensitive applications in the public cloud
Managing sensitive applications in the public cloudieeepondy
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 

Similar to Curb to core White Paper (20)

Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutions
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
What Is Data Center Security.pdf
What Is Data Center Security.pdfWhat Is Data Center Security.pdf
What Is Data Center Security.pdf
 
Ingres database and compliance
Ingres database and complianceIngres database and compliance
Ingres database and compliance
 
6 aproaches
6 aproaches6 aproaches
6 aproaches
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
 
What operational technology cyber security is?
What operational technology cyber security is?What operational technology cyber security is?
What operational technology cyber security is?
 
F017414853
F017414853F017414853
F017414853
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdf
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
 
Securing_Medical_Imaging_in_the_Cloud_Whitepaper
Securing_Medical_Imaging_in_the_Cloud_WhitepaperSecuring_Medical_Imaging_in_the_Cloud_Whitepaper
Securing_Medical_Imaging_in_the_Cloud_Whitepaper
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Managing sensitive applications in the public cloud
Managing sensitive applications in the public cloudManaging sensitive applications in the public cloud
Managing sensitive applications in the public cloud
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 

More from Ryan Hadden

Schneider electric webinar
Schneider electric webinarSchneider electric webinar
Schneider electric webinarRyan Hadden
 
Data center infrastructure management (dcim) for dummies
Data center infrastructure management (dcim) for dummiesData center infrastructure management (dcim) for dummies
Data center infrastructure management (dcim) for dummiesRyan Hadden
 
First Solar - Webinar takeaways
First Solar - Webinar takeawaysFirst Solar - Webinar takeaways
First Solar - Webinar takeawaysRyan Hadden
 
Next Generation Data Centers – Are you ready for scale?
Next Generation Data Centers – Are you ready for scale?Next Generation Data Centers – Are you ready for scale?
Next Generation Data Centers – Are you ready for scale?Ryan Hadden
 
Simplivity webinar presentation
Simplivity webinar presentationSimplivity webinar presentation
Simplivity webinar presentationRyan Hadden
 
Live webinar data center_160224_revision
Live webinar data center_160224_revisionLive webinar data center_160224_revision
Live webinar data center_160224_revisionRyan Hadden
 
Live webinar data center_160224_revision
Live webinar data center_160224_revisionLive webinar data center_160224_revision
Live webinar data center_160224_revisionRyan Hadden
 
OSisoft webinar slides
OSisoft webinar slidesOSisoft webinar slides
OSisoft webinar slidesRyan Hadden
 

More from Ryan Hadden (8)

Schneider electric webinar
Schneider electric webinarSchneider electric webinar
Schneider electric webinar
 
Data center infrastructure management (dcim) for dummies
Data center infrastructure management (dcim) for dummiesData center infrastructure management (dcim) for dummies
Data center infrastructure management (dcim) for dummies
 
First Solar - Webinar takeaways
First Solar - Webinar takeawaysFirst Solar - Webinar takeaways
First Solar - Webinar takeaways
 
Next Generation Data Centers – Are you ready for scale?
Next Generation Data Centers – Are you ready for scale?Next Generation Data Centers – Are you ready for scale?
Next Generation Data Centers – Are you ready for scale?
 
Simplivity webinar presentation
Simplivity webinar presentationSimplivity webinar presentation
Simplivity webinar presentation
 
Live webinar data center_160224_revision
Live webinar data center_160224_revisionLive webinar data center_160224_revision
Live webinar data center_160224_revision
 
Live webinar data center_160224_revision
Live webinar data center_160224_revisionLive webinar data center_160224_revision
Live webinar data center_160224_revision
 
OSisoft webinar slides
OSisoft webinar slidesOSisoft webinar slides
OSisoft webinar slides
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Curb to core White Paper

  • 1. CurbtoCore: BestPracticesforData CenterPhysicalSecurity Put simply, data drives our economy. From healthcare to higher education, from finance to bioscience, data is critical to the success of organizations in every industry. What we do and how we support the functions of data collection, storage and the absolute need to keep that information secure grows more critical every day. Keeping that data secure is not a one- size-fits-all proposition. That’s why it’s necessary to thoughtfully assess your current and future needs before you allocate your budget and deploy a program to secure critical assets. To maximize the investment in physical security, consider each section of the facility from the perimeter of the property to the center of the facility where the server racks are housed. This “curb to core” approach demonstrates effective physical security measures that complement the fundamental business operations of the data center. In this constantly evolving market, facility managers need to be aware of new physical security options and best practices for securing data and data facilities. Whether you’re a company looking to evaluate a data center, or a data company looking to upgrade and improve their security, we’ll discuss some of the codes and requirements from major organizations along with important considerations for each facility layer, from curb to core. Protecting Different Types of Data Centers As a facility manager, you know that most data centers fit into one of three broad categories. The enterprise data center essentially serves as the backbone of the corporation. Sites for these types of data centers are generally selected based on cost factors; they tend to be located where land and connectivity are the cheapest or where existing business operations can provide the needed space and infrastructure. Most of these sites have existing physical security measures and practices in place that can offer a starting point to “bolt on” the needs of the data center space. The second type is the co-location or “colo” data center. These facilities provide a range of data management services for their clients or tenants. When it comes to security, the co-location facility can be particularly challenging in that competing entities could very well find themselves storing important data across the hall, in the cage adjacent to, or even within the same cage as one another. Keeping each client’s needs represented and fundamentally separate is demonstrated by the need and value of security all the way to the server rack cabinet. The third type, known as a blended or distributed model, is most common among large corporations. True to its name, the “distributed model” is characterized by the use of space owned or leased by the entity that needs it. By Chris Hobbs
  • 2. Oftentimes, the rental of external space can be a short-term solution as the company constructs additional buildings of its own, at which point the storage is brought back under the corporate roof. Obviously, the blended model responds to the ever-changing needs of rapidly expanding online companies, utility or infrastructure providers. The fact that data is being stored in different facilities requires a more thorough approach to physical security. Standards and Codes Depending on the industry of the data center user, the access control solution must satisfy thorough and specific compliance requirements. Three important examples of these regulations are outlined below. Health Insurance Portability and Accountability Act of 1996 (HIPAA): HIPAA Title II includes an administrative simplification section that deals with the standardization of health care information systems. In the information and communications technology (ICT) industries, this section is what most people mean when they refer to HIPAA. The Act seeks to establish standardized mechanisms for electronic data interchange security and the confidentiality of all health care data. HIPAA mandates standardized formats for: • All patient health, administrative and financial data. • Unique identifiers (ID numbers for each health care entity, including individuals, employers, health plans and health care providers). • Security mechanisms to ensure confidentiality and data integrity for any information that identifies an individual. Payment Card Industry Data Security Standard (PCI DSS): The PCI DSS is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information. It requires that access to system information and operations be restricted and controlled and that cardholder data is protected physically and electronically. North American Electric Reliability Corporation (NERC): Five of NERC’s nine mandatory CIP (Critical Infrastructure Protection) standards are important to consider when managing your data center security: CIP-003: Requires that responsible entities have minimum-security management controls in place to protect Critical Cyber Assets; CIP-004: Requires that personnel with authorized cyber or unescorted physical access to Critical Cyber Assets, including contractors and service vendors, have an appropriate level of personnel risk assessment, training, and security awareness; CIP-005: Requires the identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets reside, as well as all access points on the perimeter; CIP-006: Addresses implementation of a physical security program for the protection of Critical Cyber Assets; CIP-007: Requires responsible entities to define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets, as well as the other (non-critical) Cyber Assets within the Electronic Security Perimeters. The common thread across all these regulatory requirements is the need for proper security (both physical and electronic) to ensure the safety of data. While the various regulations mandate data protection, they do not prescribe CurbtoCore: BestPracticesforDataCenterPhysicalSecurity-continued “What we do and how we support the functions of data collection, storage and the absolute need to keep that information secure grows more critical every day.”
  • 3. the path to achieve this goal. As a result, it
is critical for data center professionals to have a thorough understanding of applicable compliance requirements so they can identify the best solutions and policies for their organizations. Securing the Perimeter Regardless of the type of data center, physical protection begins at the perimeter. A berm of dirt or land, for example, can be created to establish a physical barrier that prevents vehicles driving on the property. With permission of local jurisdictions, the physical security solution can begin with landscaping, high-security fencing or a combination of the two. High security perimeter solutions from Ameristar include top- of-the-line steel fencing with anti-ram barriers, designed to withstand multiple vehicle threats. Within the fencing is an ideal spot for exceptionally sensitive intrusion detection systems, or IDS. These systems use a variety of technologies such as lasers to detect movement across the top of the fence and then generate an alert when someone tries to cross, or wire tension sensors to alert when someone attempts to scale a fence. Main Entrance The next layer is the main entrance to the facility, which is typically a vestibule housing the visitor management and access control functions. In some cases this includes a mantrap. This space is a neutral zone where the visitor or employee is out of the weather but still needs to be qualified before being granted access to the building, a step that requires accompaniment by authorized personnel or evidence of access rights such as a credential. Typically a mantrap includes an electrified deadlatch, such as the 4300 Steel Hawk from Adams Rite, which combines mechanical locking hardware with electrified access control while working within standard aluminum entrance door preparation. Interiors Next is the interior, where conference rooms, managerial offices and an array of general purpose space requires different types of physical security measures. Securitron offers a variety of entry devices, particularly the R100 surface mounted wireless reader and Aperio hub, which brings access control to entryways with fully encrypted AES 128 communication and audit trail capabilities. These areas are separate from the data center floor and often house other large equipment such as batteries and generators, which are mission-critical to protect data during power outages. The openings into these spaces are generally oversized and therefore require specialty doorframes and hardware. Ceco offers an RF shielded door and frame that prevents outside interference, ensuring that sensitive and confidential data is contained. These openings guarantee a high level of durability, thickness, blast resistance and gasketing to prevent fumes from escaping. Critical Infrastructure Space The next layer enters the very core of the building. When it comes to protecting the servers and the infrastructure that supports their operation, there must be a durable, proven access control solution in place. Often a biometric reader is employed to identify people based on their hand geometry, fingerprints or irises as a method of dual authentication aside the traditional card access system. Cages are generally associated with co-locations. If a client rents a 10-foot- by-10-foot space, he will almost certainly expect that space to be physically separated from the spaces rented by other clients. The cages offer six-side CurbtoCore: BestPracticesforDataCenterPhysicalSecurity-continued
  • 4. protection and are usually protected by a combination of biometrics, Securitron maglocks, and card access. Client business models generally drive security deployment at this level to ensure regulatory compliance. Servers The server cabinets are the last stop. This is an area with security options ranging from relatively simple locks to advanced access control solutions with audit trail capabilities. To protect the data held within each server rack, HES offers the KS100 server cabinet lock and Aperio hub. If there is an existing access control system, the Aperio hub ties in directly, bringing real- time access control to each cabinet in a single-card system. This wireless solution greatly improves the monitoring and security level of each server cabinet. It uses existing ID badges so there are no keys to control or replace and no codes to secure or remember. If a hardwired solution is required, HES offers the KS200 server cabinet lock that uses Wiegand wiring to integrate seamlessly with any existing access control and ID badge system. Both options support a Small Format Interchangeable Core (SFIC) key override and provide robust, cost-effective access control that meets strict regulatory compliance and protects data. Both the KS100 and KS200 have the added capability of extending their impact to include three contact points that are commonly used to monitor the side panels of the racks, providing a central point for the communication back to the access control platform. This not only extends the value and impact of the access control device but also lowers the cost of deployment versus traditional installations. There is also the option of enhancing the KS200 by removing the mechanical override and replacing it with a Medeco XT electronic cylinder for a full accountability solution. Since data centers are indeed critical, and need more than what a mechanical solution can offer, there is also the XT Intelligent Key System that provides scheduling, audit and ability to expire keys thereby increasing accountability and security. The products selected will depend in large part on the way the servers are arranged in the space. With either an open room with many rows of server racks or a hot aisle or cold aisle configuration there are operational and environmental challenges. In either scenario, the HES KS100 and KS200, with a Medeco XT Intelligent Key System as well as the Securitron R100, are optimal solutions. Best Practices It is important that protocols are in place not just for data security but also for life safety and good business practices. In fact, when procedures are not developed or deployed, it creates significant vulnerabilities for the organization. Like other facets of facility management, execution is paramount. Several organizations, including BICSI, the Federal Emergency Management Agency and ASIS International, offer guidance in the development and management of security protocols. Regardless of the type of data center you’re managing, the advances made in this field make it possible to offer higher levels of security from the perimeter through to the server cabinet itself as a competitive advantage. In nearly any industry, companies will pay a premium to protect their critical data. Chris Hobbs is Business Development Leader, Data Centers at ASSA ABLOY Door Security Solutions. He can be reached at Chris.Hobbs@assaabloy.com. CurbtoCore: BestPracticesforDataCenterPhysicalSecurity-continued