Introduction
Physical security as the foundation for overall security
Overview of Computer Room Security and Maintenance Practices
Data Center and Server Room Standards
Case Study
Infrastructure Exposure Risks
Servers
Switches
Routers
Cables
Storage
Other devices
How Data Gets Compromised
Capturing data traveling across network
Sniffer software
Plugging into a hub
Other
Server Room Access
Locks
Keys
Key codes
Log book
Authorization
Policies and Procedures
Card access
Request form
Approvals
Electronic Access Systems
Authentication
Smart card
Token
Biometric scan
Password expiration policies
Computer Room Layout and Design
Heating, ventilation, and air conditioning (HVAC)
Doors, windows and walls
Electrical Systems
Raised Floor Systems
Server Cabinet Systems
Cables
Alarms
Assessing Vulnerabilities
Evaluating the physical layout
Taking stock of devices
Temperature
Traffic
Using computer as office space
Smoking, eating, and drinking
Surveillance
Continuous monitoring
Camera placement
Motion detection
Notification options
Hardware Management and Maintenance
Workstations
Rack mount servers
Case lock down
Portables
Backup Systems
Disaster recovery
Making storage devices inaccessible
Printers
On-board memory
Paper shredders
Communication and Teamwork
Communicating security policy objectives
Getting management buy-in
Getting team member on board
Follow-up and Evaluation
Measuring Effectiveness of Security Implementation
Analyzing Effects Over Time
Patching the Holes
Keeping Up to Date
Physical Security Resources
Summary and Conclusion
|