Cyber security has been the topic of discussion for the year…The EU’s new GDPR regulations has brought to light scandals such as the Cambridge Analytica or the worrying and almost weekly expose of financial institutions or service providers having their databases hacked – personal data leaked or sold illegally to third parties.
Less often discussed but just as significant as the security of our personal data, is the security of the centres that house the data. A first glance of all the elements that a data centre must have – terms of security - would appear to be a complex. Things to consider are the facility size, organisation type, complexity of the system, customer requirements - just to name a few. To simplify these variables, we can separate them into two key areas: physical security and operational security.
And yes, while both depend greatly on technology, the single most important factor to consider is the establishment of key policies that allow processes and operating procedures to be understood and followed. Unfortunately, we have all read about of security breaches – both physical and operational that have occurred through the lack of clear and structured security processes and procedures. Ironically, we have seen this occur most often in data centres that possess top spec equipment and hardware implemented.
Having the latest sophisticated bio-metric access systems does not ensure that secure areas are exactly that – secure! There will always be unauthorised and unsupervised personal walking through secure areas at their own will. The reason behind this failure is not fault with the access control equipment itself but the appropriate security protocols not being implemented or maintained.
With operational security, the standard requirement for any modern data centre is to have dismissal capabilities fully integrated to ensure continuous operation even if problems arise. For most data centre operators’ customers, this is non-negotiable, given their dependence on the often mission-critical systems the data centres house. On the other hand, just as with ensuring physical security that is of great importance, applying systems for fully redundant operation is not simply a matter of installing more of the latest equipment. Implementing data centre redundancy is an immensely complex challenge.
Of course, the initial designs are important, as well as a professional installation and interlinking of redundant systems, whether for power, cooling, monitoring and finally communications. But again, the question to ask is whether the protocols and procedures that must be implemented and followed are robust enough and fit for purpose.
Regardless of whether the data centre in question is hyper scale or a relatively small edge facility, having the right process in place with the right trained workers conforming to these procedures is essential. Without the disciplined procedures and processes, success in security cannot be guaranteed – in fact, you can at some point, expect trouble.
To bring you one step closer to a fully secure working infrastructure, We design, supply and install the best data centre security solutions to the latest industry standards & regulations, and our preferred security solutions include the very latest in technology such as Bio-metric finger print and iris readers for access control and video motion detection for our CCTV security solutions. All of our data centre security solutions are designed and installed with full certification, ensuring your data centre or server room is fully protected.