DATA CENTER
SECURITY
ITM 315
Meghana Bhushan
Preview
Protecting against Physical Intrusion
Physical Data Center Security Considerations
Physical Data Center Security Systems
Controlling Threat in the Facility
Benefits of Data Center Security
Protecting against Physical Intrusion
Main concern for businesses - tops the list
Good security = 24/7/365
360 degree monitoring
Security personnel must also be trained on internal processes regarding
Who is authorized to enter the facility?
Who can enter to make deliveries?
Who can remove equipment for repairs?
Physical Data Center Security Considerations
Building should not be visible to the street
Limit access to the facility
Redundant utilities are also required
Restrictions on the removable media
Computers should be on the interiors
Thick, concrete walls
Emergency door designs with alert
If you want to break into the back door of a building, drive a car through
the front door
Physical Data Center Security Systems
Biometrics
Thumbprint scanner
Facial recognition
Retina scan
Authentication levels
Ubiquitous card key
Smart cards with embedded chip
Proximity key technology
Pin or Password
Physical Security Precautions
Employee head count
Customer volume
Number of company vehicles
Criticality of facility
Building assets
Controlling Threat in your Facility
Map the network Flag hackers
Identify and place control over highvalue assets
Build team accountability processes
Benefits of Data Center Security
Detect advanced malware and close security gaps
Shield data centers from advanced persistent threats (APTs) and sophisticated malware
Stop attacks entering organizations
Receive on-target analysis
Get a multi-pronged approach with Adaptive Defense
Protect your key assets
Prevent attacks
Safeguard your organization
Respond to incidents in your data center faster
Detect threats quickly
Get reliable, fast malware analysis
Provide continuous, dynamic, non-disruptive resolution
Conclusion
Therefore, Data center security is mainly about managing risks
Build a highly secure building with a balance:
Confidentiality
Integrity
Access
References
Lawton. S. (2014, December 2). A guide to physical data center security solutions. Retrived from
http://www.tomsitpro.com/articles/physical-data-center-security,2-831-2.html
Scalet. S. D. (2015, March 31). How to build physical security into a data center. Retrieved from
http://www.csoonline.com/article/2112402/physical-security/physical-security-19-ways-to-buildphysical-security-into-a-data-center.html
Data center security: Controlling threat in your facility. (2015, March 3). Retrieved from
http://www.datacenterknowledge.com/archives/2015/03/03/data-center-security-controlling-threat-inyour-facility/
Barker. D. (2012, July 26). A guide to physical security for data centers. Retrieved from
http://www.datacenterjournal.com/a-guide-to-physical-security-for-data-centers/