{"id":160,"date":"2006-11-07T00:00:00","date_gmt":"2006-11-07T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/11\/07\/19-ways-to-build-physical-security-into-a-data-center-2\/"},"modified":"2021-12-30T11:36:37","modified_gmt":"2021-12-30T11:36:37","slug":"19-ways-to-build-physical-security-into-a-data-center-2","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/11\/07\/19-ways-to-build-physical-security-into-a-data-center-2\/","title":{"rendered":"19 Ways to Build Physical Security into a Data Center"},"content":{"rendered":"<p>At information-intensive companies, data centers don&#8217;t just hold the crown jewels; they are the crown jewels.  Protecting them is a job for whiz-bang technologists, of course.  But just as important, it&#8217;s a job for those with expertise in physical security and business continuity.  That&#8217;s because all the encryption and live backups in the world are a waste of money if someone can walk right into the data center with a pocket knife, a camera phone and bad intentions.  There are plenty of complicated documents that can guide companies through the process of designing a secure data center&#8212;from the gold-standard specs used by the federal government to build sensitive facilities like embassies, to infrastructure standards published by industry groups like the Telecommunications Industry Association, to safety requirements from the likes of the National Fire Protection Association.  But what should be the CSO&#8217;s high-level goals for making sure that security for the new data center is built into the designs, instead of being an expensive or ineffectual afterthought?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sure, the extra precautions can be expensive.  But they&#8217;re simply part of the cost of building a secure facility that also can keep humming through disasters.<\/p>\n<p><u><b>Suggestions:<\/b><\/u><br \/>\nBuild on the right spot.<br \/>\nHave redundant utilities.<br \/>\nPay attention to walls.<br \/>\nAvoid windows.<br \/>\nKeep a 100-foot buffer zone around the site.<br \/>\nUse retractable crash barriers at vehicle entry points.<br \/>\nLimit entry points.<br \/>\nMake fire doors exit only.<br \/>\nProtect the building&#8217;s machinery.<br \/>\nPlan for secure air handling.<br \/>\nEnsure nothing can hide in the walls and ceilings.<br \/>\nUse two-factor authentication.<br \/>\nHarden the core with security layers.<br \/>\nProhibit food in the computer rooms.<br \/>\nInstall visitor rest rooms. <\/p>\n<p>http:\/\/www.csoonline.com\/read\/110105\/datacenter.html<\/p>\n<p>I would also advise that you don&#8217;t organize related systems in nice rows (hortiontal or vertical).  It might be convienent but a localized incident could take out a whole critical business solution.  So distribute related systems across a data center.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-160","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=160"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/160\/revisions"}],"predecessor-version":[{"id":2647,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/160\/revisions\/2647"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}