Network technologies and trends

Aug 31 2012   1:27PM GMT

Data Center Security Policies and Procedures – part5



Posted by: Yasir Irfan
Tags:
Networking

This will be my last series on Data Center Security Policies and Procedures, I will be covering the Exception Reporting and Requesting Access to the Data Center

 

  1. 1.     Exception Reporting

All infractions of the Data Center Physical Security Policies and Procedures shall been reported to the ITKE*.  If warranted (e.g., emergency, imminent danger, etc.).

When an unauthorized individual is found in the DataCenterit must be reported immediately to the responsible ITKE* member.  If this occurs during the evening hours, IT call center or ITKE* senior staff should be contacted.  The unauthorized individual should be escorted from theDataCenter and a full written report should be immediately submitted to ITKE*.

  1. 2.     Requesting Access to the Data Center

Departments / Projects that have computer equipment in the DataCentermay request access to the DataCenter.  The individuals designated by the requesting department/project will be granted access once ITKE* authorized them.  To initiate authorization for access, the manager of the department/project requesting access should direct a request to the ITKE* .  Upon approval by the Head of ITKE*, the person will fill the Datacenter Access Request Form and be provided with a copy of the ITKE* Data Center Access Policies and Procedures document.  A person’s department must notify the ITKE* as soon as possible so that the person’s access to the Data Center can be removed.  This is extremely important in cases where the employee was terminated for cause.  ITKE* – reserves the right not to allow entrance to the Data Centre if the Data Centre already has too many companies performing works.

 

RESPONSIBILITY

  1. It is the responsibility of the ITKE*, End-user Departments, contractors/ vendors/representative to ensure implementation of this IPP.
  2. Respective department heads are responsible for ensuring adherence to the provisions of this IPP.
  3. Audit and Follow-Up Administration will monitor compliance to the provisions stipulated herein.

I hope the policies covered in these series of article will help you out to draft an effective Data Center policy.

*ITKE is used just as reference which can be replaced by your organization or department name

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: