In the present world, there is a need for an infrastructure that underpins the electronic communication, the internet and digital commerce sectors. This need has resulted to the increasing demand for organizations to construct datacenters. A datacenter is a building that houses important computing resources under a centralized management in a controlled environment. The system assists an organization to run in accordance to the business needs. Datacenter has evolved very fast to cope with different business application environments that use separate domains that are costly to maintain and manage. Some of the computing resources stored in a datacenter include:
- Application servers
- Operating systems
- Messaging servers
- Web servers
- Storage subsystems
- Network infrastructure
Data center physical security
Data centers need to be safeguarded against internal harm and intruders that are motivated by intentional infiltration. It is of great importance to protect the datacenter against hazards caused by normal activities of the staff operating in the facility. Below is a guide to physical security for data centers:
- Layout and security. The datacenters should be strategically situated in an area where it is not vulnerable to dangers such as car crash and fires. On this note, a disaster recovery plan should be put in place.
- Physical access controls. Any person accessing a data center should have a good reason in doing so. Implementation of a strict visitor sign-in process should be adhered to.
- Outsourcing of data security roles. Organizations should not hire completely the services of a third-party to be in-charge of their data center security. Instead, a company should appoint a manager to ensure that the third party is handling the physical security properly.
- Installation of surveillance cameras. Cameras should be put all around a perimeter wall, exits and entrances to monitor movement in and out of the building.
Data center security
Data center security revolves around three concepts known as AAA. The three concepts are:
- Accounting. It gives summary and logging data for authorization and authentication systems.
- Authentication. It is a procedure where a person identifies himself or herself to a system. Majority of the systems need a combination of a secret code and an identifier.
- Authorization. It is a process that associates user identity with the right to access a particular service.
Data center security guide
Data center designs are distinct and comply with specific technologies and standards. The systems incorporate multiple technologies, match capacity to traffic, combine various cabling types, which develop a set of complicated operations. There are different strategies and layers utilized by security and network experts to safeguard datacenters from external and internal threats. A network IPS is a technology employed in these strategies regardless of the extent of the vulnerability. Here are some guidelines considered in the execution of IPS network:
- Use of logical VLAN interfaces on network sensors that provide designers with the option to deal with various deployment requirements.
- Maintain a configuration and a scale of performance using dedicated network IPS sensors for specific data center processes.
- Ensure that network IPS sensors incorporate well with the surrounding network habitat because datacenters are designed for highly available connectivity as well as high-speed.