Case Study
Case Study
Company
ASSIGNMENT
Data Center security management has become a major challenge due to the increase in the
number of additional equipment and devices. In this assessment, you will come to know how you
can build an ISO 27001 adaptable center with the identification and effectiveness of the controls
of information security. This assessment improves the security of the Data Center by summarizes
A Data Center is a dedicated building or facility that holds all the systems that are critical or
that includes those which are affecting Data Centers is increasing its number day by day. Data
Centers keep all the sensitive information of the organization. So, the concern in the security of
the data is important. The Data Center must maintain high standards of secrecy of data,
The term physical and environmental safety refers to the steps taken to protect systems,
structures, and supporting infrastructure associated with the threats associated with their
environment. Physical and environmental protection is mostly overlooked but is very important
in the protection of information. Physical security in recent decades has become increasingly
difficult for organizations. Technology and computer facilities now allow for more compromise
The researcher in this case study on which we are going to do the assessment does a study on the
environmental and physical security of Hong Kong wine and spirits database Distribution
Company. The main responsibility of this company is the distribution of wine and spirits to many
South Asian countries which includes China, Hong Kong, Singapore, Malaysia, Thailand,
Vietnam, Laos, Cambodia, Indonesia, and the Philippines. The small data center of this company
is in Hong Kong. The environmental and physical status of this data center was not good at all.
No physical and environmental safety policy evolved from this institution. The researchers were
hired to do the research on the problems and to provide solutions to the problems that are taken
out. The Data security policy that includes lots of information, details, and guidelines that are
used to solve the driven problems that are related to security is ISO/IEC 27001:2005. This ISO
benchmark is the most effective practice which assists organizations and other businesses from
all over the world to make the best Information Security Management System (ISMS) for
For data security, the ISO 27001 (known as the Security Management System (ISMS) standard)
is the most widely used standard. It focuses on ensuring integrity, access, and confidentiality, and
system that can be used to test, operate, and maintain an Information Security Management
System. Many companies around the world are working to implement this standard for several
reasons, among them: debt reduction due to unused policies and procedures; measuring the
ISO 27001 or more precisely ISO / IEC 27001: 2005 Information technology - Security
and local security of Data Protection Systems (ISMS). ISO 27001 is not a mandatory law; is a
collection of "best practices" and "certified knowledge-based practices" related to ISMS. ISO
27001 is an official standard where organizations can claim an independent ISMS certificate.
ISO 27001 is a "top-down" data management system. This policy includes nine parts that contain
environmental security.
ISMS Standard 27001: 2005 considers all of the risks involved in determining the requirements
for innovation, use operation, monitoring, review, maintain and improve the written ISMS within
total business risk overall. The three main principles involved are confidentiality, integrity, and
availability. The environmental and physical security are covered by these principles.
Outside segments ought to be
of steady construction.
Entryways with control components such as
bars, alarms, and locks ought
to be utilized against unauthorized access
Windows should be bolted and windows at
ground level ought to have extra assurance like
intruder detection systems
The fire doors must work
while in understanding with fire regulations
All guests must be issued a
guest pass sometime recently entering the
office
The data center should be
utilized for quick recuperation after damaging
incidents
Firefighting supplies must be introduced and
placed appropriately in accordance with the law
Secure regions should be appropriately bolted a
nd periodically checked
As it was authorized staff will get permitted to
the secure areas
REFERENCES:
A. Calder. (2005) Nine Steps to Success: An ISO 27001 Implementation Overview. London: IT
Governance Publishing.
Governance
protection
Bird, Katie (2020) "NEW VERSION OF ISO/IEC 27001 TO BETTER TACKLE IT SECURITY
RISKS". iso.org. ISO.
Neha Yadav. (2019). The most common physical and network controls when implementing ISO