Intelligent CISO Issue 41 | Page 30

Preventing unauthorised access to buildings is one of the most critical security requirements for data centres .
editor ’ s question

?

ata centres have

D become part of a nation ’ s critical infrastructure and any disruption to them can have severe consequences . Their critical role and the value of the data they hold also makes them a target for attacks , both cyber and physical . With data now recognised as one of the world ’ s most valuable commodities , cybercriminals are investing in more sophisticated methods of attack . However , many cyberattacks often start with physical access . Whether deliberate via disgruntled employees or those coerced into helping criminals , the easiest way into the server racks is via someone with physical access .

In addition to the value of the data itself , the disruption to business and society that would be caused by affecting or even halting the data centre ’ s operation makes them an attractive target for terrorists or activists . An integrated , layered approach to security to mitigate against internal and external threats is essential , starting beyond the data centre ’ s perimeter and extending through to the server room .
• IP surveillance solution : Monitoring the airspace above and around a data centre through drone detection is critical . The scale of a data centre can also mean a lengthy physical perimeter open to physical breach . Network video , thermal cameras and analytics can cover the entire site perimeter and alert a response . Official site entrances and exits also need monitoring and protection . Network video surveillance combined with technologies such as license plate recognition can ensure that only those authorised enter the site .
• Premises and site : Within the site itself , radar is a valuable complementary technology to traditional video surveillance in tracking people and moving objects across open spaces and large sites . Being less sensitive to things that might trigger false alarms in other surveillance technologies – such as moving shadows or light beams , small animals , raindrops or insects , wind and bad weather – radar is particularly useful in maximising limited physical security resources . Again , combined with network audio , warning people that they might be entering a prohibited zone can be an effective way to manage security remotely .
• Access control : Preventing unauthorised access to buildings is one of the most critical security requirements for data centres . Modern and increasingly
ETTIENE VAN DER WATT , REGIONAL DIRECTOR , AXIS COMMUNICATIONS MEA
‘ frictionless ’ access control can include video verification in addition to access credentials through cards or even mobile phones and can be configured to only give specific individuals access to those buildings and areas within them for which they have authorisation . Cameras and connected sensors can also ensure the security of buildings , safety of those within and operations of the data centre .
• Server room and racks : The place where the ‘ crown jewels ’ are kept , access to the server room and racks themselves are seen as the ultimate goal . Physical access to a server itself would allow for the implanting of malware or spyware , granting cybercriminals access and power . Securing access to server rooms and monitoring the activity within them are therefore some of the most critical areas of data centre security . In the cabinets and racks themselves , specific access control technology and video verification can be used for access , while also creating an important audit trail of individuals who have opened the cabinet . u

Preventing unauthorised access to buildings is one of the most critical security requirements for data centres .

30 www . intelligentciso . com