Vous êtes sur la page 1sur 9

DATA CENTER

SECURITY
ITM 315
Meghana Bhushan

Preview
Protecting against Physical Intrusion
Physical Data Center Security Considerations
Physical Data Center Security Systems
Controlling Threat in the Facility
Benefits of Data Center Security

Protecting against Physical Intrusion


Main concern for businesses - tops the list
Good security = 24/7/365
360 degree monitoring
Security personnel must also be trained on internal processes regarding

Who is authorized to enter the facility?

Who can enter to make deliveries?

Who can remove equipment for repairs?

Physical Data Center Security Considerations


Building should not be visible to the street
Limit access to the facility
Redundant utilities are also required
Restrictions on the removable media
Computers should be on the interiors
Thick, concrete walls
Emergency door designs with alert

If you want to break into the back door of a building, drive a car through
the front door

Physical Data Center Security Systems


Biometrics

Thumbprint scanner
Facial recognition
Retina scan

Authentication levels
Ubiquitous card key
Smart cards with embedded chip
Proximity key technology
Pin or Password

Physical Security Precautions


Employee head count
Customer volume
Number of company vehicles
Criticality of facility
Building assets

Controlling Threat in your Facility


Map the network Flag hackers
Identify and place control over highvalue assets
Build team accountability processes

Benefits of Data Center Security

Detect advanced malware and close security gaps


Shield data centers from advanced persistent threats (APTs) and sophisticated malware
Stop attacks entering organizations
Receive on-target analysis

Get a multi-pronged approach with Adaptive Defense


Protect your key assets
Prevent attacks
Safeguard your organization

Respond to incidents in your data center faster


Detect threats quickly
Get reliable, fast malware analysis
Provide continuous, dynamic, non-disruptive resolution

Conclusion
Therefore, Data center security is mainly about managing risks
Build a highly secure building with a balance:

Confidentiality

Integrity

Access

References
Lawton. S. (2014, December 2). A guide to physical data center security solutions. Retrived from
http://www.tomsitpro.com/articles/physical-data-center-security,2-831-2.html
Scalet. S. D. (2015, March 31). How to build physical security into a data center. Retrieved from
http://www.csoonline.com/article/2112402/physical-security/physical-security-19-ways-to-buildphysical-security-into-a-data-center.html
Data center security: Controlling threat in your facility. (2015, March 3). Retrieved from
http://www.datacenterknowledge.com/archives/2015/03/03/data-center-security-controlling-threat-inyour-facility/
Barker. D. (2012, July 26). A guide to physical security for data centers. Retrieved from
http://www.datacenterjournal.com/a-guide-to-physical-security-for-data-centers/

Vous aimerez peut-être aussi