TODAY ’ S DATA CENTRES HAVE BECOME OUR LITERAL KEYS TO THE KINGDOM AND SHOULD BE OUR MOST HIGHLY SECURED SPACES .
E X P E R T O P I N I O N ecurity , at its most
S basic element , is one of the most crucial aspects of a data centre facility . Along with power , conditioned air and real estate itself , security is not just an amenity , but a foundational component of a data centre ’ s critical infrastructure . The need to safely and securely store and process individual , company and public information is at the very heart of why data centres exist and why security is of the highest priority .
The impact of a physical or cybersecurity breach poses a grave threat , potentially crippling vital services , erasing or compromising financial data , or jeopardising critical health data when it is needed most . Just as societies have protected their most valuable assets over time – today ’ s data centres have become our literal keys to the kingdom and should be our most highly secured spaces .
The importance of location and TVRA in data centre security
While it can appear that data centres are popping up everywhere ( and the requisite demand can certainly drive this mindset ), the basis of securing our most approach in which multiple layers ( or zones ) of protection are defined physically , operationally and through strident processes and procedures . The approach ensures that each layer provides a higher level of defined security and stronger measures of deterrence throughout the facility . As a result , the most critical and important areas within the data centre environment are most secure and accessible to only those with the proper level of authorisation and clearances .
“
TODAY ’ S DATA CENTRES HAVE BECOME OUR LITERAL KEYS TO THE KINGDOM AND SHOULD BE OUR MOST HIGHLY SECURED SPACES .
critical information is formed in the actual location of the facility itself .
Whether it is the policy of the hyperscaler , the service provider , or a compliancedriven standard – where and how secure a data centre facility is driven by a Threat , Vulnerability , Risk Assessment ( TVRA ) – which defines all aspects of threats a facility might incur in a specific location .
The threats , such as poor site lines , neighbouring motorways , adjacent neighbours and short set-back distances , are measured against the vulnerabilities inherent in the design of the data centre itself . This combination of threats and vulnerabilities provides a data centre provider or a dedicated end-user with the risk profile for the site . All of which determines the approach and mitigation strategies of how to properly secure the property , the facility and ultimately the primary asset – information .
The approach : Layered security measures
Most data centres are predicated on the concept of a concentric circle
All of this is predicated on proven strategies of deterrence , detection , delay and defence . Each data centre will determine how they approach the tactics at and within each zone of intervention and what elements within their facility will be included in this layer – but the ultimate strategy is always based on this concentric process .
Physical threats
The physical elements , including anticlimb fencing , fortified entry / egress points and extensive camera and technology displays , are immediately apparent at any data centre location , providing a visible deterrent from the first layer . However , the physical electronic security components are but one aspect of a data centre ’ s layered strategy .
Beyond these robust and hardened elements , a data centre ’ s security programme is supported by the combined structure of operational staffing and rigorous policies and procedures . At each secured layer , individuals are challenged to confirm their identity , their authorisation , as well as the premise by
www . intelligentdatacentres . com 43