We have security standards in place for a reason, to keep all data centres regulated to ensure they’re properly equipped to withstand an attack. How does the layout of these security systems help to reduce intruders, trespassers, or attackers?
A method that is favoured by many is the layered approach. This strategy gives sites an in-depth defence that deploys a series of mechanisms to slow the advance of an attack. The idea being that if by some chance one layer is breached, then a subsequent layer is already in place to prevent the threat progressing further into the compound. The 4 layers that are usually implemented include Perimeter Security, Facility Security, Computer Room Security and Cabinet Security.
Data Centre Perimeter Security
As we know the first layer is going to be the first line against defence, used by data centres to discourage, deter, and delay any unauthorised entry. The main element to the perimeter security is an effective fencing system that can keep individuals out. Fencing systems are an excellent way to keep boundaries clear and stop trespassers entering just on their own accord. With this, a data centre fence line must be accredited with a security rating that lessens the potential level of threat, to comply with the physical security standards. Many require at least a minute’s delay time in attack, allowing responders to arrive on the scene. That’s why our systems within our high security range are tried and tested to LPS 1175 from LPCB, with the minimum delay being 1 minute. Although fencing systems are a major part of the perimeter security, it’s not the only thing that can be used to deter an attack. In conjunction with an effective high security fence line, many sites use video surveillance systems, motion activated lighting, and even manned security guard stations to track movement and deter an intruder from attempting to gain access.
If the perimeter security were to be breached somehow, then the next layer of security would be facility control. This restricts access into the building by using access control systems like key cards and biometrics. The key card access or biometric entry points allow for authorized personnel only accessing the building. To go one step further in protecting the facility, high security temporary gate systems could be used around entry points that are able to withstand force. If you have another physical barrier to overcome within the site as well as the exterior, then this might deter some intruders from trying.
Computer Room Security
Even with the highest level of fencing and access control systems, if an individual is determined enough to get in, they may find a way into the facility. If an intruder makes it into the facility, then social engineering and tailgating can become a very real threat to the data centre! That’s where the third layer comes into play, computer room controls. This third layer restricts access further and using video content analytics (VCA), and biometric access control devices can minimise the chance of an unauthorised individual getting in. The use of turnstiles can also reduce the risk of breaching by creating entry restrictions and can also decrease the chance of tailgating or piggybacking employees with these devices.
Cabinet Data Security
The fourth and final layer of security is within the control room, acting as cabinet security. The three layers previously mentioned have been to prevent outside threats from accessing and breaching compounds. However, the final layer of security addresses the risk of an insider attack, for example a disgruntled employee. This final layer involves locking mechanisms working in conjunction with the systems that have been previously mentioned, such as VCA and biometric devices. With this layer being so close to sensitive information and data, it’s about physical and cyber security working together as a final defence against threats to minimise the loss or theft of information.
If you want to find out more about our work within the Data Centre industry and how we could help you, chat to one of our experts on 01270 764751 or drop an email to firstname.lastname@example.org.