DC Security and Controls
DC Security and Controls
1 ICT Security
2 Data Centre
Confidentiality
Integrity
Availability
Authenticity
Accountability
http://www.mampu.gov.my/mampu/spa
Requirements
Adopt ISO-27001 (replaces BS 7799 – Part 2)
Information Security Management System (ISMS)
* Personnel * Cabinet
Identification
(i) Prevention
To prevent unauthorized personnel from entering
computing facilities.
(i.e., locations housing computing resources,
supporting utilities, computer hard copy, and
input data media)
(i) Prevention
Examples:
• Backup files and documentation.
• Fences.
• Security guards.
• Badge systems.
• Double door systems.
• Locks and keys.
• Backup power.
• Biometric access controls.
• Site selection.
• Fire extinguishers.
Hak Milik INTAN KURSUS PENGURUSAN PUSAT DATA : PENGOPERASIAN 28
B. Security Layer and Controls
(ii) Detection
Warn protective services personnel that physical security
measures are being violated.
• Motion detectors.
• Smoke and fire detectors. VESDA
(i) Prevention
to prevent unauthorized personnel or programs from
gaining remote access to computing resources.
Examples:
• Access control software.
• Antivirus software.
• Passwords.
• Smart cards.
• Encryption.
• Dial-up access control and callback systems.
• Authentication
(ii) Detection
To warn personnel of attempted violations.
Examples:
• Audit trails
• Intrusion Detection Systems (IDS)
Insider
Poor Passwords.
Physical Security.
Insufficient Backup and Recovery.
Improper Destruction.
Social Media.
Social Engineering.
(i) Prevention
(i) Prevention
Examples:
• Security awareness and technical training.
• Separation of duties.
• Procedures for recruiting and terminating employees.
• Security policies and procedures.
• Supervision.
• Disaster recovery, contingency, and emergency plans.
• User registration for computer access.
(i) Detection
To determine how well security policies and
procedures are complied with, to detect fraud, and
to avoid employing persons that represent an
unacceptable security risk.
(i) Detection
Examples:
• Security reviews and audits.
• Performance evaluations.
• Required vacations.
• Background investigations.
• Rotation of duties.
• Low-key appearance
• Avoid windows
• Limit entry points
• Anti-passback and man-traps
• Hinges on the inside
• Plenty of cameras
• Make fire door exit only
• Permanent security staff
• Test. Test and test again
• Don’t forget the layers
Hak Milik INTAN KURSUS PENGURUSAN PUSAT DATA : PENGOPERASIAN 48
Ways to Build Physical Security into a Data Centre
Site layout