Network technologies and trends

Apr 11 2012   5:05AM GMT

Data Center Security Policies and Procedures – part1

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

Data Centers are heart for any organization; Data Centers are the one which houses the majority of Servers farms, Switches, routers, security solutions, SANs and much more. These days we were asked to develop the Security Polices and Procedures for our Data Centre which I am going to share in upcoming blogs.

In this particular part of my article I will try to focus on the Data Center physical security policy and procedures.

 

1. Overview

Security for the Data Center is the responsibility of all departments that are sharing the data center space. ITKE* is responsible for the administration of this policy. The following are the general requirements and policies to access to this sensitive area. Failure to follow the guidelines set forth in this document is grounds for termination of agreements and potential legal action.

Customer MUST NOT, except as otherwise agreed by ITKE*,

    1. Place any computer hardware or other equipment in the Licensed Area
    2. Store any other combustible materials of any kind in the Licensed Area; and
    3. Bring any “Prohibited Materials” (as defined below) into the Data Centre. Prohibited Materials shall include, but NOTlimited to, the following and any similar items:
        1. Food, drink, illegal drugs and other intoxicants
        2. Tobacco products
        3. Explosives and weapons
        4. Hazardous materials
        5. Electro-magnetic devices, which could unreasonably interfere with computer and telecommunications equipment
        6. Radioactive materials
        7. Photographic or recording equipment of any kind
        8. Any other items deemed inappropriate at ITKE*’s sole discretion.

2. Primary Guidelines

The “Data Center” is a restricted area requiring a much greater level of control than normal spaces. Only those individuals who are authorized to do so by the ITKE* may enter this area. ¬†Access privileges will only be granted to individuals who have business need to be in the data center.

All departmental staff sharing the Data Center will familiarize themselves thoroughly with this document. Any questions regarding policies and procedures should be addressed to ITKE*.

The only exception allowed to the Data Center Security Policies and Practices is temporary suspension of these rules if it becomes necessary to provide emergency access.

In upcoming article I will try to focus on levels of access can be provided to the Data Centers.

*ITKE is used just as reference which can be replaced by your organization or department name.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: