Data Center Security and
Surveillances
Requirements for the Protection
Systems
โ€ข Safeguard assets
โ€ข Safeguard of personnel
โ€ข Two major types
โ€“ Physical Security
โ€“ Information Security
What is physical security?
โ€ข Protection of people and physical property
โ€ข Traditional physical security involved guards,
locks, keys, etc. โ€“ this is changing
โ€ข Physical security in buildings, including data
centers, is becoming increasingly dependent
on technical systems for control and
monitoring
Physical Security
โ€ข Protection of physical assets
โ€ข Buildings
โ€ข Computing facilities
โ€ข Physical access control
โ€ข Power
Physical threats and risks
โ€ข Fire
โ€ข Explosion
โ€ข Destruction
โ€ข Power Failure
โ€ข Water Damage, Leakage, Theft
โ€ข Service Disruption, Loss of key
โ€ข Natural Phenomena
Physical
Security
Alarm System
Physical Access
Control
Lighting
Fire
Power
Management
Intercom
Evacuation
CCTV Systems
Intrusion
Detection
Bio-metric Example
Physical Security
Steps for physical security
1. Build at the right spot
2. Have redundant utilities
3. Pay attention to walls
4. Avoid windows
5. Use landscaping
6. Keep a 100 foot buffer zone around the site
Steps for physical security(Contd.)
7. Use retractable crash barriers at the vehicle
entry point
8. Plan for bomb detection
9. Limit a entry points
10.Make fire doors exit only
11.Use plenty of cameras
12.Protect the buildingโ€™s machinery
Steps for physical security(Contd.)
13.Plan for secure air handling
14.Ensure nothing can hide in the walls and
ceilings
15.Use two-factor authentication
16.Harden the core with security layers
17.Watch the exits too
18.Prohibit food in the computer room
19.Install visitor rest rooms
Present CCTV over IP Solution
Security Operations
Center
Monitor
Data Center
WAN
SAN
Campus
LAN
Network Video
Recorder
Storage
Analog camera
IP camera
Video encoder
Cisco switch
Cisco router
Fiber
IP Connection
FiberChannel
Fiber Transceiver
Coaxial cable
Campus
Building
Remote Site
Logical threats and risks
โ€ข Human faults
โ€ข Operational Disruptions
โ€ข Software Faults
โ€ข Fraud
โ€ข Access Control
โ€ข Illegal copying
โ€ข Viruses
PDR Security
People
Antivirus
VPN
Firewall
Access Control
Detection
Vulnerability
Testing
Intrusion Detection
Log Correlation
CCTV
Response
Intrusion
Prevention
Managed Services
Patch Management
CIRT
Is system secured?
Secured
System
Security
measures
Identity and access management
interoperability
Intranet
Extranet Internet
Employees Suppliers/
Partners
Customers Consumers
Cisco ASA 5500 Series Firewall
Cisco ASA 5500 Series Firewall
(Contd.)
โ€ข Remote Access
โ€ข Intrusion Prevention System
โ€ข Content Security
Cisco ASA 5580-40
โ€ข Supports Maximum
firewall connection
2,000,000
โ€ข Maximum
connections/second is
150,000
โ€ข Maximum
packets/second is
4,000,000
โ€ข Maximum VLAN
interfaces is 250
Cisco NAC Appliance 3395
Network Admission Control
โ€ข Authentication Integration with single Sign-On
โ€ข Device Quarantine
โ€ข Automatic Security policy updates
โ€ข Centralized management
โ€ข Remediation and repair
โ€ข Flexible deployment Modes
โ€ข Product Architecture
โ€“ Cisco NAC Server
โ€“ Cisco NAC Manager
โ€“ Cisco NAC agent
Antivirus
โ€ข Symentac Web Hosting
Disaster Recovery

Data Center Security

  • 1.
    Data Center Securityand Surveillances
  • 2.
    Requirements for theProtection Systems โ€ข Safeguard assets โ€ข Safeguard of personnel โ€ข Two major types โ€“ Physical Security โ€“ Information Security
  • 3.
    What is physicalsecurity? โ€ข Protection of people and physical property โ€ข Traditional physical security involved guards, locks, keys, etc. โ€“ this is changing โ€ข Physical security in buildings, including data centers, is becoming increasingly dependent on technical systems for control and monitoring
  • 4.
    Physical Security โ€ข Protectionof physical assets โ€ข Buildings โ€ข Computing facilities โ€ข Physical access control โ€ข Power
  • 5.
    Physical threats andrisks โ€ข Fire โ€ข Explosion โ€ข Destruction โ€ข Power Failure โ€ข Water Damage, Leakage, Theft โ€ข Service Disruption, Loss of key โ€ข Natural Phenomena
  • 6.
  • 7.
  • 8.
  • 10.
    Steps for physicalsecurity 1. Build at the right spot 2. Have redundant utilities 3. Pay attention to walls 4. Avoid windows 5. Use landscaping 6. Keep a 100 foot buffer zone around the site
  • 11.
    Steps for physicalsecurity(Contd.) 7. Use retractable crash barriers at the vehicle entry point 8. Plan for bomb detection 9. Limit a entry points 10.Make fire doors exit only 11.Use plenty of cameras 12.Protect the buildingโ€™s machinery
  • 12.
    Steps for physicalsecurity(Contd.) 13.Plan for secure air handling 14.Ensure nothing can hide in the walls and ceilings 15.Use two-factor authentication 16.Harden the core with security layers 17.Watch the exits too 18.Prohibit food in the computer room 19.Install visitor rest rooms
  • 13.
    Present CCTV overIP Solution Security Operations Center Monitor Data Center WAN SAN Campus LAN Network Video Recorder Storage Analog camera IP camera Video encoder Cisco switch Cisco router Fiber IP Connection FiberChannel Fiber Transceiver Coaxial cable Campus Building Remote Site
  • 14.
    Logical threats andrisks โ€ข Human faults โ€ข Operational Disruptions โ€ข Software Faults โ€ข Fraud โ€ข Access Control โ€ข Illegal copying โ€ข Viruses
  • 15.
    PDR Security People Antivirus VPN Firewall Access Control Detection Vulnerability Testing IntrusionDetection Log Correlation CCTV Response Intrusion Prevention Managed Services Patch Management CIRT
  • 16.
  • 17.
    Identity and accessmanagement interoperability Intranet Extranet Internet Employees Suppliers/ Partners Customers Consumers
  • 18.
    Cisco ASA 5500Series Firewall
  • 19.
    Cisco ASA 5500Series Firewall (Contd.) โ€ข Remote Access โ€ข Intrusion Prevention System โ€ข Content Security
  • 20.
    Cisco ASA 5580-40 โ€ขSupports Maximum firewall connection 2,000,000 โ€ข Maximum connections/second is 150,000 โ€ข Maximum packets/second is 4,000,000 โ€ข Maximum VLAN interfaces is 250
  • 21.
    Cisco NAC Appliance3395 Network Admission Control โ€ข Authentication Integration with single Sign-On โ€ข Device Quarantine โ€ข Automatic Security policy updates โ€ข Centralized management โ€ข Remediation and repair โ€ข Flexible deployment Modes
  • 22.
    โ€ข Product Architecture โ€“Cisco NAC Server โ€“ Cisco NAC Manager โ€“ Cisco NAC agent
  • 23.
  • 24.