Data Center Security
Data Center Security
Praful Dixit
change or destruction and protection of the system itself against unauthorized use, change or
denial of service. Where there are Data Storage Units, there would be some recommendations
that would keep the security of the physical storage units. There would be policies surrounding
Always keep servers and critical equipment in separate area. Do not make it another
office, a shared activity room, a storage room or keep it in the hallway. Separate the data storage
units from other areas like work areas. That way there is no excuse for hanging out next to them.
Data Storage Units themselves need security because an open physical port is a method of attack
and if an accident can happen, it will happen. “Securing a computer system has traditionally been
a battle of wits: the penetrator tries to find the holes, and the designer tries to close them,”
(Gosser, 1988).
Make sure all activity in the server room is either emergency or scheduled. “Strict
procedures for access to the machine room are used by most organizations,” (Gosser, 1998).
There should be no one in the room is unauthorized or untested all updates and security checks
should be scheduled regularly anyway. In the event of an emergency, then the meaningfulness of
those operations should be apparent and according to disaster recovery, or emergency continuity
plans. All maintenance, all activity, should be scheduled and approved by the administration
beforehand.
Log all Access. A complete history of every access, every change, should be kept, so that
all happenings around the server room are known. Always check authorized access. Every time
the door opens and someone goes in or someone comes out, the person’s name and what time it
DATA CENTER SECURITY
was accessed and what they say they did, while they were in there.
Secure the room with a physical lock. Do not just let people sneak off into the server
room, however innocent, it may appear to be. That is just how accidents happen and then when
something does happen, the management will ask why this happened and then the answer should
be obvious. “A computer lets you make more mistakes faster than any invention in human
history, with the possible exceptions of handguns and tequila,” Ratliffe, (1992).
Make sure that sensitive equipment is locked or inaccessible. If a hacker can walk up and
simply plug into a hub or another device then it is not secure. Make sure no cables can be spliced
into without some awareness and there are no open ports outside that room.
Lock up ports by physical device and by software security programs that will inhibit the
You should keep the room and its contents under surveil. Video cameras, transparent wall
and centralized location will allow those working in the area to see the Data Storage unit who is
in the room and what they are doing at all times. It is bad enough you do not know what is going
on inside the box by looking at it; you should always know what is going on outside the box.
Secure the whole network. Secure all surrounding offices with computers and ports; you
can also have software precautions against access by unauthorized persons like access log and
password standards like routine password changes. Never leave your desk with your workstation
logged in. Always use self-closing doors and auto locks. This will ensure that passwords remain
Make sure any device that contains sensitive information, schedules or the access log are
secured in a confidential manner. Any Drive, any backups can be hacked and encryption
algorithms given enough time. Shred all physical documents once they are not in use. Any
DATA CENTER SECURITY
You should always keep your security up to date and in good working order. Anti-virus,
firewalls, encryption, passwords and patches should all be up to date. Any potential security
issues are to be handled in a timely fashion, such as if the lock should break: replace the lock. If
a window is broken, have the window fixed. These are security vulnerabilities and our jobs as
There should be policies in place that govern authorized access, both to the physical Data
Storage Units and to the data over secure connections. Only IT staff should have access to the
server at any time and then they should have written authorization and the awareness of your
supervisor. Only the IT management and their direct supervisor should have complete control
over the Data Center. IT staff will have proper authorization and be on schedule. Need to know
access users should be handled with well-formed transactions, so they see what we intend for
Conclusion
Recommendations for the Physical Security of the Data Center includes Separate the data
storage units from other areas like work areas. All activity in the server room is either emergency
or scheduled. Log all Access. Control Access and secure the room with a physical lock. Make
sure sensitive equipment is inaccessible. Lock ports by physical device and by software security
programs that will inhibit access by the passerby. You should keep the room and its contents
under surveil. Secure the whole network. Secure all devices. Always keep security up to date and
fix physical vulnerabilities as soon as possible. All access will have proper authorization and be
on schedule. Well-formed transactions grant data to need to know users to provide top security.
Use permissions and access control software as well as escort them to where they are receiving
the information.
DATA CENTER SECURITY
References
http://nucia.unomaha.edu/dspace/documents/gasserbook.pdf.