ECS data centers have best-in-class physical security standards — All about Data center physical security

ECS BIZTECH
5 min readAug 27, 2021

--

ECS data center

When a company entrusts it’s IT infrastructure with a data center, they need assurance that their data is protected by all means. While the modern trend is to attack a server or network remotely, physical security matters just as much. While online protection measures are tightened, miscreants often attempt to access the physically vulnerable points of the data center in order to steal data.

What is data center security?

Data center security refers to the array of technologies and practices that are used to protect the facility’s physical infrastructure. Essentially, it’s all about restricting and managing access. Only authorized personnel should be able to access critical infrastructure. Today’s data centers are far more complex than a room filled with servers. They are often designed from ground up with the best security equipment and practices in place. Protocols and procedures for common and unusual contingencies need to be in place to provide clear guidelines for operations. These controls are developed well in advance and are regularly tested to ensure that everyone knows how to keep the facility secure from potential threats. Most data centers implement a zero trust security philosophy to reduce the risk of unauthorized access. Processes are audited regularly to ensure their effectiveness.

Data center tiers and security

While data center tiers don’t directly reflect the security standards, the higher the tier the more complex the environment gets. These tiers (3 & 4) incorporate more sophisticated and extensive security measures. The higher tiers have more redundancy configured and ensure higher levels of uptime.

Important data center security standards

Here are a few security standards that every colocation service provider uses:

Layered security measures: Every aspect of the data center’s security works in concert with other elements as a part of a comprehensive, layered system. The idea is that a potential intruder should be forced to breach several layers of security before reaching valuable data or hardware assets. If one layer proves ineffective, other layers should be capable of preventing the intrusion.

Access lists: This seems like a simple thing, but is one of the most important aspects of data center security. It ensures that only authorized personnel are permitted to access the key assets. Maintaining up-to-date access lists can help prevent theft and guard against human error.

5 layers of high level of physical security

ECS Data Center:

Our ECS Data Center follows 4–5 layers of high level of physical security. Following physical security reinforced by ECS:

  1. 2 full checking when someone enters

Security begins from the basics. Thorough checking of anyone entering the data center is performed.

  1. 1 door- 1 person entry at time

The best way to restrict access is to restrict physical entry. We follow a 1 door — 1 person entry policy. A any given time, only one person is allowed to enter the premises.

  1. Cage security : racks in cage security

Cage security includes a mesh around the racks. The servers are physically protected from anyone trying to access them physically.

  1. SUV cameras

Surveillance cameras are an essential part of physical security of a data center. It helps identify unauthorized access in case of security breaches.

  1. Biometrics

Biometrics is implemented to identify people through their unique physical characteristic such as thumb print, retina shape or voice pattern. There are a variety of ways to incorporate biometrics into access protocols and makes is a valuable component of security in terms of two factor authentication.

  1. Secure access point

Sensitive zones such as data floor us secured with more than a mere locked door. Check points with floor to ceiling coverage are implemented to prevent unauthorized access and to tighten the physical security of the datacentre facility.

  1. Anti-Rodent System (rats and lizards can’t enter)

Electronic rodent repellents use high-frequency sounds to drive rats and lizards away. Rats and mice emit high pitched sounds and this is effectively used to deter them. These high pitched sounds are alarming to mice and discourage them from feeding in affected areas.

  1. WLDS(Water Leakage detection system )

A leak detection system is implemented to monitor the water leakages through any pipes and when an abnormal behaviour is detected, the system cuts off the water flow entirely.

These systems are programmable and protect the physical data center from water logged disasters. Leak detection systems are also capable of detecting when pipes are in danger of freezing. When pipes freeze, they are at risk of cracking or bursting. Leak detection systems will sever the water connection until temperatures rise and risk is averted.

  1. VESDA (very early smoke detection system)

VESDA — Very Early Smoke Detection System includes continuous air sampling to provide the earliest possible warning of an impending fire hazard. Smoke detectors buy addition time needed to investigate an alarm. This helps us initiate an appropriate response to prevent injury, property damage or business disruption.

  1. Fire safety safety : NOVEC gas- specially for computer system

We ensure that the cooling systems itself are efficient enough to now allow a fire to take place, but we also ensure that we adhere to strict fire safety protocols in our data centers. Sensors and NOVEC gas are used to implement fire safety.

In today’s age of ‘data’, it’s essential to ensure that your organisations’ data is kept physically secure. The best quality cameras and alarms won’t amount to much without security of the staff onsite to respond to potential threats.

ECS offers data center colocation within a managed service environment and provide you with reliable, scalable and highly secure data ccenter access.

  • ECS offers the premier scalability with multiple levels of redundancy.
  • Our organization offers the maximum uptime in the industry with the powerful state-of-the-art infrastructure.
  • We own high-density and hyper-scale data centers to fulfil the enterprise requirements.

For a decade and more, our clientele experiences safe and powerful colocation data server services with the best infrastructure and technical support. However, we would like to mention that all our data centers are built to Tier 4 standards. Multi Zone security with multiple redundancy levels ensures that the level of security is of the highest standards. We offer 24×7×365 Help Desk / Security Operations Center and an excellent technical team to support in case of any issues.

If you are looking for high security environments, our ECS Tier 4 data center has everything — do reach out to us to find out more.

--

--

ECS BIZTECH
ECS BIZTECH

Written by ECS BIZTECH

ECS Biztech is providing powerful and emerging solutions provider as well as consulting service in Cyber Security, Cloud managed services and Digital Forensics.

No responses yet