SlideShare a Scribd company logo
1 of 11
Coromatic Academy
Open Compute Project, Critical Facilities Operations Framework
Process: Security and Access
Rev 2020-08-03
Information classification: Public
Contents
• Process overview
• Lessons learned / customer experiences
• Final notes
SECURITY AND ACCESS
OCP Critical Facilities Operations Framework
Site Operations
Integration
Terms &
Conditions
OCP CFOPS Delivery model
Incidents
Work Orders & Projects
On-site Access
Service Levels
Organization
KPI Monitoring
& Reporting
Lifecycle &
Financial
Mgmt
On-site
services
Security &
Access
Maintenance
In / outdoor
FM
Site
assistance
Site Inspection
Audits and
Compliance
Site Management
Delivery Support
Service Level
Mgmt
Lifecycle &
Financial
Mgmt
WO & Project
Mgmt
Monitoring &
Reporting
Governance
and BCP
Advisory and
Benchmarking
Supply Chain
and Sourcing
Service Desk
24/7
Incident Mgmt
Team &
Suppliers
Capacity
Mgmt &
Optimization
Document
Mgmt
Compliance
Mgmt
Service
Improvements
Asset List
Border List
Customer
Managed
Operating
Center
Source: OCP CFOPS 2019 v1.4
Security and Access
MindMap Overview Process Summary
The security and access process, procedures and building construction
should be appropriate to the assets that they are protecting. This would
include critical assets in the primary area as well as site systems in other
parts of the net floor area.
Perimeter protection
A critical facility should be appropriately protected against threats that may
break the perimeter. By protecting against external and environmental
threats, i.e. man-made or natural disasters, it is focused on ensuring that
only designated access points can be used to gain entry to the critical facility.
Typical services may include patrolling by guards or CCTV monitoring of
different parts of the building and its external premises.
Furthermore, the building construction itself may allow for several
protective layers or zones which can increase the level of the perimeter
protection and further protect against breaches outside the ordinary access
control points.
Source: OCP CFOPS 2019 v1.4
Lessons learned / Customer experiences
“Every time we have US or UK based site Owners ask us to
manage their sites, they expect us to have armed on-site
guards 24/7.
It usually does not take very long to convince them of the
cost benefits and reliability of remote security monitoring
with scheduled patrols and call-outs, especially when
considering the protection classification based on the
passive security measures of the building itself and the
restrictions on armed security guards…”
Security and Access
MindMap Overview Process Summary
The security and access process, procedures and building construction should be
appropriate to the assets that they are protecting. This would include critical
assets in the primary area as well as site systems in other parts of the net floor
area.
Access control
All personnel, visitors and deliveries to the site should be registered and processed
according to operational procedures where at least the following should be made:
• Verification of identity, i.e. authentication
• Verification of authorization
• Logging of access
Remote monitoring of alarm systems and CCTV is normally used to control access
to premises or rooms when a correct authentication has been performed.
Appropriate controls are put in place to ensure that access control audit logs
cannot be altered, tampered, or deleted, thus destroying evidential integrity. This
integrity is generally required to support a potential criminal prosecution because
of a security incident.
The access control system audit logs should be inspected on a recurring basis.
Source: OCP CFOPS 2019 v1.4
Lessons learned / Customer experiences
“The importance of separating accountabilities have proven to be a
success factor to us:
the Site Owner is accountable for authorizing who should be allowed
into the premises, while the outsourced Site Access service provider is
accountable for authenticating individuals wanting to gain access.
This means that if a person is properly authenticated and has the
authorization to gain access they will be let in. Otherwise not.
By independent reviews of the access logs, it is validated that these
procedures are followed diligently.
We even have service levels with penalties for this process.”
Final notes
• Passive perimeter protection should be complemented
by active protection measures
• Access control relies on a well managed process for
“Team & Suppliers Management” (Staff Register)
• On-site works should always include updating and
finalizing related documentation and service records
• Handling of personal data need to be GDPR compliant
Questions?
coromatic.com
10. Process: ocp cfops security and access

More Related Content

What's hot

2. Process: ocp cfops service level mgmt
2. Process: ocp cfops service level mgmt2. Process: ocp cfops service level mgmt
2. Process: ocp cfops service level mgmtssusereb347d
 
7. Process: ocp cfops compliance mgmt
7. Process: ocp cfops compliance mgmt7. Process: ocp cfops compliance mgmt
7. Process: ocp cfops compliance mgmtssusereb347d
 
4. ocp cfops.monitoring reporting.guideline.2019.5
4. ocp cfops.monitoring reporting.guideline.2019.54. ocp cfops.monitoring reporting.guideline.2019.5
4. ocp cfops.monitoring reporting.guideline.2019.5ssusereb347d
 
11. Process: ocp cfops maintenance
11. Process: ocp cfops maintenance11. Process: ocp cfops maintenance
11. Process: ocp cfops maintenancessusereb347d
 
5. Process: ocp cfops work orders and project mgmt
5. Process: ocp cfops work orders and project mgmt5. Process: ocp cfops work orders and project mgmt
5. Process: ocp cfops work orders and project mgmtssusereb347d
 
6. Process: ocp cfops capacity mgmt and optimization
6. Process: ocp cfops capacity mgmt and optimization6. Process: ocp cfops capacity mgmt and optimization
6. Process: ocp cfops capacity mgmt and optimizationssusereb347d
 
16. Process: ocp cfops delivery support
16. Process: ocp cfops delivery support16. Process: ocp cfops delivery support
16. Process: ocp cfops delivery supportssusereb347d
 
8. Process: ocp cfops document mgmt
8. Process: ocp cfops document mgmt8. Process: ocp cfops document mgmt
8. Process: ocp cfops document mgmtssusereb347d
 
17. Process: ocp cfops integration
17. Process: ocp cfops integration17. Process: ocp cfops integration
17. Process: ocp cfops integrationssusereb347d
 
17. ocp cfops.integration.guideline.2019.1
17. ocp cfops.integration.guideline.2019.117. ocp cfops.integration.guideline.2019.1
17. ocp cfops.integration.guideline.2019.1ssusereb347d
 
12. Process: ocp cfops indoor outdoor fm
12. Process: ocp cfops indoor outdoor fm12. Process: ocp cfops indoor outdoor fm
12. Process: ocp cfops indoor outdoor fmssusereb347d
 
0. ocp cfops flyby
0. ocp cfops flyby0. ocp cfops flyby
0. ocp cfops flybyssusereb347d
 
8. ocp cfops.document mgmt.guideline.2019.2
8. ocp cfops.document mgmt.guideline.2019.28. ocp cfops.document mgmt.guideline.2019.2
8. ocp cfops.document mgmt.guideline.2019.2ssusereb347d
 
IAB Europe Metrics & KPIs Brand Advertiser Bulletin
IAB Europe Metrics & KPIs Brand Advertiser BulletinIAB Europe Metrics & KPIs Brand Advertiser Bulletin
IAB Europe Metrics & KPIs Brand Advertiser BulletinIAB Europe
 
RealWinWin Wholesale Rebate Administration Services
RealWinWin Wholesale Rebate Administration ServicesRealWinWin Wholesale Rebate Administration Services
RealWinWin Wholesale Rebate Administration ServicesRealWinWin, Inc.
 
Telefonica Case Study
Telefonica Case Study  Telefonica Case Study
Telefonica Case Study Felipe Scholz
 
Visionwaves Knowledge Days - in control dashboards
Visionwaves Knowledge Days  - in control dashboardsVisionwaves Knowledge Days  - in control dashboards
Visionwaves Knowledge Days - in control dashboardsIlse Boer
 
Generic Presentation EEIS
Generic Presentation EEISGeneric Presentation EEIS
Generic Presentation EEISJim Thayer
 
Shared Services_Compliance_credential
Shared Services_Compliance_credentialShared Services_Compliance_credential
Shared Services_Compliance_credentialGene Goziker
 
Revisiting the Four Pillars Supporting an Effective BSA/AML Compliance Program
Revisiting the Four Pillars Supporting an Effective BSA/AML Compliance ProgramRevisiting the Four Pillars Supporting an Effective BSA/AML Compliance Program
Revisiting the Four Pillars Supporting an Effective BSA/AML Compliance ProgramRachel Hamilton
 

What's hot (20)

2. Process: ocp cfops service level mgmt
2. Process: ocp cfops service level mgmt2. Process: ocp cfops service level mgmt
2. Process: ocp cfops service level mgmt
 
7. Process: ocp cfops compliance mgmt
7. Process: ocp cfops compliance mgmt7. Process: ocp cfops compliance mgmt
7. Process: ocp cfops compliance mgmt
 
4. ocp cfops.monitoring reporting.guideline.2019.5
4. ocp cfops.monitoring reporting.guideline.2019.54. ocp cfops.monitoring reporting.guideline.2019.5
4. ocp cfops.monitoring reporting.guideline.2019.5
 
11. Process: ocp cfops maintenance
11. Process: ocp cfops maintenance11. Process: ocp cfops maintenance
11. Process: ocp cfops maintenance
 
5. Process: ocp cfops work orders and project mgmt
5. Process: ocp cfops work orders and project mgmt5. Process: ocp cfops work orders and project mgmt
5. Process: ocp cfops work orders and project mgmt
 
6. Process: ocp cfops capacity mgmt and optimization
6. Process: ocp cfops capacity mgmt and optimization6. Process: ocp cfops capacity mgmt and optimization
6. Process: ocp cfops capacity mgmt and optimization
 
16. Process: ocp cfops delivery support
16. Process: ocp cfops delivery support16. Process: ocp cfops delivery support
16. Process: ocp cfops delivery support
 
8. Process: ocp cfops document mgmt
8. Process: ocp cfops document mgmt8. Process: ocp cfops document mgmt
8. Process: ocp cfops document mgmt
 
17. Process: ocp cfops integration
17. Process: ocp cfops integration17. Process: ocp cfops integration
17. Process: ocp cfops integration
 
17. ocp cfops.integration.guideline.2019.1
17. ocp cfops.integration.guideline.2019.117. ocp cfops.integration.guideline.2019.1
17. ocp cfops.integration.guideline.2019.1
 
12. Process: ocp cfops indoor outdoor fm
12. Process: ocp cfops indoor outdoor fm12. Process: ocp cfops indoor outdoor fm
12. Process: ocp cfops indoor outdoor fm
 
0. ocp cfops flyby
0. ocp cfops flyby0. ocp cfops flyby
0. ocp cfops flyby
 
8. ocp cfops.document mgmt.guideline.2019.2
8. ocp cfops.document mgmt.guideline.2019.28. ocp cfops.document mgmt.guideline.2019.2
8. ocp cfops.document mgmt.guideline.2019.2
 
IAB Europe Metrics & KPIs Brand Advertiser Bulletin
IAB Europe Metrics & KPIs Brand Advertiser BulletinIAB Europe Metrics & KPIs Brand Advertiser Bulletin
IAB Europe Metrics & KPIs Brand Advertiser Bulletin
 
RealWinWin Wholesale Rebate Administration Services
RealWinWin Wholesale Rebate Administration ServicesRealWinWin Wholesale Rebate Administration Services
RealWinWin Wholesale Rebate Administration Services
 
Telefonica Case Study
Telefonica Case Study  Telefonica Case Study
Telefonica Case Study
 
Visionwaves Knowledge Days - in control dashboards
Visionwaves Knowledge Days  - in control dashboardsVisionwaves Knowledge Days  - in control dashboards
Visionwaves Knowledge Days - in control dashboards
 
Generic Presentation EEIS
Generic Presentation EEISGeneric Presentation EEIS
Generic Presentation EEIS
 
Shared Services_Compliance_credential
Shared Services_Compliance_credentialShared Services_Compliance_credential
Shared Services_Compliance_credential
 
Revisiting the Four Pillars Supporting an Effective BSA/AML Compliance Program
Revisiting the Four Pillars Supporting an Effective BSA/AML Compliance ProgramRevisiting the Four Pillars Supporting an Effective BSA/AML Compliance Program
Revisiting the Four Pillars Supporting an Effective BSA/AML Compliance Program
 

Similar to 10. Process: ocp cfops security and access

20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptxAnand Dhouni
 
Rest Solution : NOC-as-a-service
Rest Solution : NOC-as-a-serviceRest Solution : NOC-as-a-service
Rest Solution : NOC-as-a-serviceChristian Torres
 
Cloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWSCloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWSAmazon Web Services
 
Analytical Instrument Qualification - USP chapter 1058 revision
Analytical Instrument Qualification - USP chapter 1058 revisionAnalytical Instrument Qualification - USP chapter 1058 revision
Analytical Instrument Qualification - USP chapter 1058 revisionpi
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
Cyber_Management_Issues.pdf
Cyber_Management_Issues.pdfCyber_Management_Issues.pdf
Cyber_Management_Issues.pdfAliAhmed675993
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechsMordecai Kraushar
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptxdotco
 
MomentumNI Flash Event 10 Jul 14 - Irish GCSC
MomentumNI Flash Event 10 Jul 14 - Irish GCSCMomentumNI Flash Event 10 Jul 14 - Irish GCSC
MomentumNI Flash Event 10 Jul 14 - Irish GCSCBill McCluggage
 
Preparing for Inspections in eTMF
Preparing for Inspections in eTMFPreparing for Inspections in eTMF
Preparing for Inspections in eTMFVeeva Systems
 
How auditable is your disaster recovery program
How auditable is your disaster recovery programHow auditable is your disaster recovery program
How auditable is your disaster recovery programgeekmodeboy
 
Vendor Management System - Introduction2
Vendor Management System - Introduction2Vendor Management System - Introduction2
Vendor Management System - Introduction2Frank Corris
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...Alan Yau Ti Dun
 
Running Head PROJECT CHARTS1PROJECT CHARTS2.docx
Running Head PROJECT CHARTS1PROJECT CHARTS2.docxRunning Head PROJECT CHARTS1PROJECT CHARTS2.docx
Running Head PROJECT CHARTS1PROJECT CHARTS2.docxtodd581
 
Risk Management Process for Healthcare Organizations
Risk Management Process for Healthcare OrganizationsRisk Management Process for Healthcare Organizations
Risk Management Process for Healthcare OrganizationsCalance
 

Similar to 10. Process: ocp cfops security and access (20)

Compliance
ComplianceCompliance
Compliance
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx
 
Profile_Kishore Sundar
Profile_Kishore SundarProfile_Kishore Sundar
Profile_Kishore Sundar
 
Rest Solution : NOC-as-a-service
Rest Solution : NOC-as-a-serviceRest Solution : NOC-as-a-service
Rest Solution : NOC-as-a-service
 
Cloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWSCloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWS
 
Analytical Instrument Qualification - USP chapter 1058 revision
Analytical Instrument Qualification - USP chapter 1058 revisionAnalytical Instrument Qualification - USP chapter 1058 revision
Analytical Instrument Qualification - USP chapter 1058 revision
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
Cyber_Management_Issues.pdf
Cyber_Management_Issues.pdfCyber_Management_Issues.pdf
Cyber_Management_Issues.pdf
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechs
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptx
 
MomentumNI Flash Event 10 Jul 14 - Irish GCSC
MomentumNI Flash Event 10 Jul 14 - Irish GCSCMomentumNI Flash Event 10 Jul 14 - Irish GCSC
MomentumNI Flash Event 10 Jul 14 - Irish GCSC
 
Preparing for Inspections in eTMF
Preparing for Inspections in eTMFPreparing for Inspections in eTMF
Preparing for Inspections in eTMF
 
How auditable is your disaster recovery program
How auditable is your disaster recovery programHow auditable is your disaster recovery program
How auditable is your disaster recovery program
 
Vendor Management System - Introduction2
Vendor Management System - Introduction2Vendor Management System - Introduction2
Vendor Management System - Introduction2
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
 
6 service operation
6 service operation6 service operation
6 service operation
 
6 service operation
6 service operation6 service operation
6 service operation
 
Running Head PROJECT CHARTS1PROJECT CHARTS2.docx
Running Head PROJECT CHARTS1PROJECT CHARTS2.docxRunning Head PROJECT CHARTS1PROJECT CHARTS2.docx
Running Head PROJECT CHARTS1PROJECT CHARTS2.docx
 
Risk Management Process for Healthcare Organizations
Risk Management Process for Healthcare OrganizationsRisk Management Process for Healthcare Organizations
Risk Management Process for Healthcare Organizations
 

Recently uploaded

Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...ssuserdfc773
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 

Recently uploaded (20)

Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 

10. Process: ocp cfops security and access

  • 1. Coromatic Academy Open Compute Project, Critical Facilities Operations Framework Process: Security and Access Rev 2020-08-03 Information classification: Public
  • 2. Contents • Process overview • Lessons learned / customer experiences • Final notes
  • 3. SECURITY AND ACCESS OCP Critical Facilities Operations Framework
  • 4. Site Operations Integration Terms & Conditions OCP CFOPS Delivery model Incidents Work Orders & Projects On-site Access Service Levels Organization KPI Monitoring & Reporting Lifecycle & Financial Mgmt On-site services Security & Access Maintenance In / outdoor FM Site assistance Site Inspection Audits and Compliance Site Management Delivery Support Service Level Mgmt Lifecycle & Financial Mgmt WO & Project Mgmt Monitoring & Reporting Governance and BCP Advisory and Benchmarking Supply Chain and Sourcing Service Desk 24/7 Incident Mgmt Team & Suppliers Capacity Mgmt & Optimization Document Mgmt Compliance Mgmt Service Improvements Asset List Border List Customer Managed Operating Center Source: OCP CFOPS 2019 v1.4
  • 5. Security and Access MindMap Overview Process Summary The security and access process, procedures and building construction should be appropriate to the assets that they are protecting. This would include critical assets in the primary area as well as site systems in other parts of the net floor area. Perimeter protection A critical facility should be appropriately protected against threats that may break the perimeter. By protecting against external and environmental threats, i.e. man-made or natural disasters, it is focused on ensuring that only designated access points can be used to gain entry to the critical facility. Typical services may include patrolling by guards or CCTV monitoring of different parts of the building and its external premises. Furthermore, the building construction itself may allow for several protective layers or zones which can increase the level of the perimeter protection and further protect against breaches outside the ordinary access control points. Source: OCP CFOPS 2019 v1.4
  • 6. Lessons learned / Customer experiences “Every time we have US or UK based site Owners ask us to manage their sites, they expect us to have armed on-site guards 24/7. It usually does not take very long to convince them of the cost benefits and reliability of remote security monitoring with scheduled patrols and call-outs, especially when considering the protection classification based on the passive security measures of the building itself and the restrictions on armed security guards…”
  • 7. Security and Access MindMap Overview Process Summary The security and access process, procedures and building construction should be appropriate to the assets that they are protecting. This would include critical assets in the primary area as well as site systems in other parts of the net floor area. Access control All personnel, visitors and deliveries to the site should be registered and processed according to operational procedures where at least the following should be made: • Verification of identity, i.e. authentication • Verification of authorization • Logging of access Remote monitoring of alarm systems and CCTV is normally used to control access to premises or rooms when a correct authentication has been performed. Appropriate controls are put in place to ensure that access control audit logs cannot be altered, tampered, or deleted, thus destroying evidential integrity. This integrity is generally required to support a potential criminal prosecution because of a security incident. The access control system audit logs should be inspected on a recurring basis. Source: OCP CFOPS 2019 v1.4
  • 8. Lessons learned / Customer experiences “The importance of separating accountabilities have proven to be a success factor to us: the Site Owner is accountable for authorizing who should be allowed into the premises, while the outsourced Site Access service provider is accountable for authenticating individuals wanting to gain access. This means that if a person is properly authenticated and has the authorization to gain access they will be let in. Otherwise not. By independent reviews of the access logs, it is validated that these procedures are followed diligently. We even have service levels with penalties for this process.”
  • 9. Final notes • Passive perimeter protection should be complemented by active protection measures • Access control relies on a well managed process for “Team & Suppliers Management” (Staff Register) • On-site works should always include updating and finalizing related documentation and service records • Handling of personal data need to be GDPR compliant

Editor's Notes

  1. Clear market leader in turnkey data centers and other critical facilities Highly skilled and experienced workforce operating out of 20 locations Unrivalled experience as a full-service provider of turnkey critical facilities solutions Proven international delivery capabilities Strong Nordic customer base across a wide range of industries