Page 24 - Security Today, July/August 2024
P. 24
within a hardened data center shell that houses row upon row of server cabinets.
Even though not compartmentalized like colocation facilities, several layers of security are required to adequately protect this type of facility, starting with perimeter fencing and exterior door- ways. Exterior doors lead to interior corridors, which lead to server rooms and server cabinets. At each point in this process, proper protections must be taken to ensure the security of the data.
Colocation Data Centers
These facilities share the same door security needs as enterprise data centers but with an additional layer of access control re- quirements. Since the facility is shared among several companies, authorized users are only assigned access privileges to their spe- cific vaults or compartmentalized areas of the building.
Creating Three Lines of Defense
to Secure Your Data Center
Perimeter security. Perimeter security controls access to the build- ing. Basic components can include industrial and high-security fencing, bollards, guard booths, and entry barriers that help pre- vent unauthorized access.
The heavy steel construction and intimidating profile of high- security fence can function as visual deterrents against intrusion. The latest generation of this fence features bracketless design, heavier posts and redesigned rail, allowing easier integration with intrusion detection systems, surveillance video and other moni- toring devices.
Access to the building and spaces within. As big as the foot- prints of today’s data centers can be, they typically do not require many employees to manage and secure them. It could be as few as half a dozen in some cases, or up to 50 depending on the scale of the physical plant and assets inside.
Regardless, it is crucial to ensure staff is indeed currently au- thorized, that airtight processes are in place for vetting and es- corting contractors and visitors or, in the case of co-located ser- vices, that proper access control segmentation is in place.
Commercial-grade doors, frames and hardware provide a means to restrict access to the facility and specific areas within it, a primary goal in any building. Some data center main en- trances feature a vestibule where a visitor will enter and wait until granted (or denied) further access.
Depending on the requirements of some jurisdictions, more facilities today are installing a security revolving door that mo- mentarily holds a visitor until cleared for access. Revolving doors also help prevent tailgating. If a tailgater is sensed, the door will temporarily trap that person. For those denied access, the door can be reversed to back people out.
In addition, certain regions may require doors, frames and hardware that can overcome hurricane, tornado, emergency egress, and other challenges that pose life-safety threats. You can protect against these hazards with doorways designed and evalu- ated to withstand such extreme conditions.
Server cabinet security. As more companies move into shared
.shock/stock.adobe.com
locations, the opportunities for unauthorized server access in- crease; the potential costs are high, whether the intrusion is ac- cidental or malicious. An additional layer of access control, such as OSDP server cabinet locks, can reduce this risk.
Accounting for Power
and Backup Capacity
Another critical line of defense is having a backup genera- tor on-site to help ensure that operations stay up and running during utility outages. Many data centers even have redundant backup systems. Since these generators rely on diesel and other fuel sources, extra security measures need to be considered as to where fuel tanks and pipelines are located. Are they exposed and possibly vulnerable?
A major factor in the development potential of land parcels is how robust and secure the electrical grid and fiber optic network are to meet the intense power and communication demands of data centers. Are utility substations well-monitored and enclosed within one of our sophisticated fence systems? Are the substa- tions located within the footprint of the data center campus or down the road, requiring additional considerations and coordi- nation with local jurisdictions and utilities?
Depending on their purpose, sensitivity, location, exposure to extreme conditions and who needs authorized access, it is clear there are many layers to consider concerning
the physical security of today’s data centers
and the critical infrastructure that supports these vital fortresses.
Chris Hobbs is the director, National Accounts, at ASSA ABLOY Door Security Solutions.
24
JULY/AUGUST 2024 | SECURITY TODAY
COVER STORY