Friday, April 1, 2016

Data Center - Security and Risk Management

Security and Risk management in data center is discussed in this video. The first key challenge is risk management which is explained as layered physical security approach. This is to protect the data from criminals or third party contractors or from the employees who happened to access the data with or without their knowledge. This layered security approach is intended to detect, deter or detain the data from breach. This helps in risk free data management and giving peace of mind to us.



First layer is called perimeter defense which includes video surveillance and fence to protect the area, which would have limited access points and physical barriers. With this security layer, it delays access to the second layer and accessing the point of entry by intruders. Second layer is the clear zone which is the area between the security and the building area. This area is marked by video surveillance to mark intrusions to identify breaches. The third layer is the highest level perimeter security the data center would have and would have the opportunity to prevent unauthorized access towards the fourth layer. This would include key system, video surveillance, card reader, security vestibule, perimeter camera. Fourth layer of security validates the access to the individuals with Digital signage, card reader, mass notification display, IBW antenna and photo badging stations for the power/cooling facilities, data room to all the visitors and contractors. These four layers together combine the physical security of the data center.



Fifth layer of security is the selective profile security for the staff, contractors and visitors to ensure the access is limited and approved to this critical space using motion egress, button egress and data cabinet lock trigger panel. The sixth layer of security is to provide controlled access and accountability directly to the equipment location. The key list of materials list for physical security holds the key and can be challenging based on need. These six layers together mitigates your risk of ineffective protection of the data center’s critical data. The interoperability of components subsystems hold importance to various stakeholders of the critical data.

No comments:

Post a Comment