What Needs Protecting?
The first step in mapping out a security plan is just that — drawing a map of the physical facility and identifying the areas and entry points that need different rules of access, or levels of security.
These areas might have concentric boundaries:
- Site perimeter
- Building perimeter
- Computer area
- Computer rooms
- Equipment racks
Or side-by-side boundaries:
- Visitor areas
- Utility rooms
Concentric areas can have different or increasingly stringent access methods, providing added protection called depth of security. With depth of security, an inner area is protected both by its own access methods and by those of the areas that enclose it. In addition, any breach of an outer area can be met with another access challenge at a perimeter further in.
Rack-Level Security At the innermost “depth of security” layer — further in than the data room itself — is the rack. Rack locks are not in common use (yet), but if used they serve as the last defense against unauthorized access to critical equipment. It would be unusual for everyone in a room full of racks to have the need to access every rack; rack locks can ensure that only server people have access to servers, only telecommunications
people have access to telecommunications gear, and so on. “Manageable” rack locks that can be remotely configured to allow access only when needed — to specific people at specific times — reduce the risk of an accident, sabotage, or unauthorized installation of additional gear that could cause a potentially damaging rise in power consumption and rack temperature.
Infrastructure Security It is important to include in the security map not only areas containing the functional IT equipment of the facility, but also areas containing elements of the physical infrastructure which, if compromised, could result in downtime. For example, HVAC equipment could be accidentally or deliberately shut down, generator starting batteries could be stolen, or a system management console could be fooled into thinking the fire sprinklers should be activated.
To receive your Physical Vulnerability Assessment, please submit your payment of $999.00
B E T T E R: Please submit your payment of $1999.00 for a complete Physical Vulnerability Assessment or Design covering a single location.