23rd February 2022

The layers of data centre security and how to achieve them?

We have security standards in place for a reason, to keep all data centres regulated to ensure they’re properly equipped to withstand an attack. How does the layout of these security systems help to reduce intruders, trespassers, or attackers?

A method that is favoured by many is the layered approach. This strategy gives sites an in-depth defence that deploys a series of mechanisms to slow the advance of an attack. The idea being that if by some chance one layer is breached, then a subsequent layer is already in place to prevent the threat progressing further into the compound. The 4 layers that are usually implemented include Perimeter Security, Facility Security, Computer Room Security and Cabinet Security.

Bespoke fencing

Data Centre Perimeter Security

As we know the first layer is going to be the first line against defence, used by data centres to discourage, deter, and delay any unauthorised entry. The main element to the perimeter security is an effective fencing system that can keep individuals out. Fencing systems are an excellent way to keep boundaries clear and stop trespassers entering just on their own accord. With this, a data centre fence line must be accredited with a security rating that lessens the potential level of threat, to comply with the physical security standards. Many require at least a minute’s delay time in attack, allowing responders to arrive on the scene. That’s why our systems within our high security range are tried and tested to LPS 1175 from LPCB, with the minimum delay being 1 minute. Although fencing systems are a major part of the perimeter security, it’s not the only thing that can be used to deter an attack. In conjunction with an effective high security fence line, many sites use video surveillance systems, motion activated lighting, and even manned security guard stations to track movement and deter an intruder from attempting to gain access.

Data Centre security fencing

Facility Security

If the perimeter security were to be breached somehow, then the next layer of security would be facility control. This restricts access into the building by using access control systems like key cards and biometrics. The key card access or biometric entry points allow for authorized personnel only accessing the building. To go one step further in protecting the facility, high security temporary gate systems could be used around entry points that are able to withstand force. If you have another physical barrier to overcome within the site as well as the exterior, then this might deter some intruders from trying.