0% found this document useful (0 votes)
164 views

Case Study

The document discusses improving the physical and environmental security of a data center for a Hong Kong wine and spirits distribution company. It analyzes the current inadequate physical and environmental protections and recommends implementing controls based on the ISO 27001 standard to address issues with airflow, temperature, humidity, power supply, and fire protection. Adopting ISO 27001 guidelines would help formalize policies around the physical layout, air conditioning, backup power, and fire safety systems to better secure the data center environment.

Uploaded by

nawal zaheer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
164 views

Case Study

The document discusses improving the physical and environmental security of a data center for a Hong Kong wine and spirits distribution company. It analyzes the current inadequate physical and environmental protections and recommends implementing controls based on the ISO 27001 standard to address issues with airflow, temperature, humidity, power supply, and fire protection. Adopting ISO 27001 guidelines would help formalize policies around the physical layout, air conditioning, backup power, and fire safety systems to better secure the data center environment.

Uploaded by

nawal zaheer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Improving the Physical and Environmental Security of a Data

Centre: Case Study of a Hong Kong Wines and Spirits Distribution

Company

ASSIGNMENT

DATE: 29 SEPTEMBER, 2020

BY: NAWAL ZAHEER


INTRODUCTION:

Data Center security management has become a major challenge due to the increase in the

number of additional equipment and devices. In this assessment, you will come to know how you

can build an ISO 27001 adaptable center with the identification and effectiveness of the controls

of information security. This assessment improves the security of the Data Center by summarizes

the requirements of the ISO 27001.

A Data Center is a dedicated building or facility that holds all the systems that are critical or

Information Technology infrastructure of an organization. The number of attacks in the security

that includes those which are affecting Data Centers is increasing its number day by day. Data

Centers keep all the sensitive information of the organization. So, the concern in the security of

the data is important. The Data Center must maintain high standards of secrecy of data,

coherence, and access to the environment of IT (Information Technology).

The term physical and environmental safety refers to the steps taken to protect systems,

structures, and supporting infrastructure associated with the threats associated with their

environment. Physical and environmental protection is mostly overlooked but is very important

in the protection of information. Physical security in recent decades has become increasingly

difficult for organizations. Technology and computer facilities now allow for more compromise

due to increased risk.

The researcher in this case study on which we are going to do the assessment does a study on the

environmental and physical security of Hong Kong wine and spirits database Distribution

Company. The main responsibility of this company is the distribution of wine and spirits to many

South Asian countries which includes China, Hong Kong, Singapore, Malaysia, Thailand,
Vietnam, Laos, Cambodia, Indonesia, and the Philippines. The small data center of this company

is in Hong Kong. The environmental and physical status of this data center was not good at all.

No physical and environmental safety policy evolved from this institution. The researchers were

hired to do the research on the problems and to provide solutions to the problems that are taken

out. The Data security policy that includes lots of information, details, and guidelines that are

used to solve the driven problems that are related to security is ISO/IEC 27001:2005. This ISO

benchmark is the most effective practice which assists organizations and other businesses from

all over the world to make the best Information Security Management System (ISMS) for

making the best management practice in their organizations.

For data security, the ISO 27001 (known as the Security Management System (ISMS) standard)

is the most widely used standard. It focuses on ensuring integrity, access, and confidentiality, and

is a structured approach designed to provide information. ISO 27001 is defined as a management

system that can be used to test, operate, and maintain an Information Security Management

System. Many companies around the world are working to implement this standard for several

reasons, among them: debt reduction due to unused policies and procedures; measuring the

effectiveness of safety controls; and improving the effectiveness of information security.

ISO 27001 or more precisely ISO / IEC 27001: 2005 Information technology - Security

Strategies - The definition of a Quality Management System is an internationally recognized

standard that governs the construction, implementation, monitoring, maintenance, development,

and local security of Data Protection Systems (ISMS). ISO 27001 is not a mandatory law; is a

collection of "best practices" and "certified knowledge-based practices" related to ISMS. ISO

27001 is an official standard where organizations can claim an independent ISMS certificate.
ISO 27001 is a "top-down" data management system. This policy includes nine parts that contain

environmental security.

ISMS Standard 27001: 2005 considers all of the risks involved in determining the requirements

for innovation, use operation, monitoring, review, maintain and improve the written ISMS within

total business risk overall. The three main principles involved are confidentiality, integrity, and

availability. The environmental and physical security are covered by these principles.

Solution Domain Application of ISO to Identified processes


BETTER Physical  Most machines are usually in the form of
PHYSICAL Layout servers mounted on 19-inch cabinet racks
ENVIRONMENT mounted in single rows which forms channels
DATA CENTER between them. In this way, people can access
the front and back of each cabinet.

 Servers vary a lot in size from 1U servers to


large storage frames that cover the space with
multiple tiles down on the floor.

 Some of the utensils that include mainframe


computers and storage devices are usually as
large as the actual racks and are placed next to
them.

 Shipping containers full of 1,000 or more


servers can be used by very large data centers.
Complete containers are while repairing or
upgrading, replaced (instead of repairing
individual servers).

 Most of the time, local building codes control


the high ceilings. The physical environment of
the data center is strictly controlled.
Air  Changing the temperature rate according to the
Conditioning ASHRAE’s “Thermal Guidelines for Data
Processing Environments”. The range is 16-21
degrees C (61-75 degrees F) and the range of
humidity 40-55% with max dew point 15
degrees C which is optimal for the environment
of the data center.

 In the data center, the heats are used by


electrical power. Electronic gadgets
malfunction will be caused as the existing
temperature rise until the heat is removed.

 If the temperature is controlled, the humidity


range and temperature range are kept in a
specific range.

 During the dry atmosphere, if the humidity is


low, the systems can add water vapor. So the
systems and the other components should be
kept cool to avoid static electricity discharge
problems.

 The use of economizer cooling, the outside air


keep the inside data center cool. The data
center should use these to enhance the working
systems.
Power Supply  The backup power supply is important as is
plays a vital role in the data center. One or
more uninterruptible power supplies or
generators are kept in the data center.

 All electrical systems elements which also


include backup systems are duplicated and
servers are connected to power feeds which
achieves redundancy in the systems. This can
help in case of power loss, blackout, or power
failure.
Fire  Data centers include fire protection programs,
Protection which include artificial and functional synthetic
materials, and also applying fire protection
systems in operation.

 The smoke detectors are also used in the data


centers that give the early warning of fire.
Installing smoke detectors that receive
manufactured particles with shorter materials
before the start of flames. This allows for
investigation, power disturbances, and hand
pressure fire holding fire extinguishers before
the fire grows larger.

 A fire spray system is often used to control a


complete fire when it grows. Fire sprinklers
require 18 in (46 cm) clearance such as free of
cable trays below the sprayers.

 Clean agent fire suppression systems can also


be used to stop a fire. This suppression system
works faster and earlier than a fire sprinkler
system.

 The installation of passive firewalls around the


data center which are protective elements.
While using these walls, at some limited
facility of the center the fire can behold for a
few time in case there is a failure in the running
fire protection systems

Raised  The floor is mostly data center is raised made


Flooring up of almost 60 cm covered with removable
tiles. These raised floors are used for the air
circulation around the floor and it also provides
a huge place or space for cabling the different
wires. This provides a good space for the cables
to be inserted below the floor and also this
raised flooring system is used for security
purposes.
Physical  If the data center contains sensitive information
Security and physical access is granted to a few people,
so it is restricted to some of the selected people.

 Apply controls like bollards or mantraps.

 Permanent security guards.

 It is also very common to use fingerprints to


trap the wrong entry by an unrecognized
person.
Application  The applications are used to handle the main
operations and business data. Some
organizations develop their own applications
internally or externally by the software vendor.

 Applications such as ERP and CRM systems


are common software used one or more than
one host. These components include databases,
file servers, application servers, etc.

 For off-site backups, data centers are also used.

 Large hardware sellers like Cisco Systems,


Sun, IBM, Microsystems, and HP as also used
in case of disaster recovery.

 In this age, it has become important for all


kinds of company organizations to get their
data security through data security applications.

PHYSICAL AND Physical  Health and safety regulations must be taken


ENVIRONMENTA Security into account
L POLICY Perimeter and
Entry Control  Edges need to be defined for all intents and
purposes depicted that each degree utilized hav
e to be appropriate and share to
the security level of the property covered and
the impacts of a risk assessment
 Edges of any building housing insights and
structures have to be substantial sound without
a gap with inside the border

 Outside segments ought to be
of steady construction.

 Entryways with control components such as
bars, alarms, and locks ought
to be utilized against unauthorized access

 Windows should be bolted and windows at
ground level ought to have extra assurance like
intruder detection systems

 Monitored and tested alarms should be fitted at


the emergency exits

 The fire doors must work
while in understanding with fire regulations

 Different parties who are managing systems


must be physically separated

 Extra boundaries like staff card control get


to the system should be actualized to control
physical access
between zones with distinctive security levels

 All staff must be identifiable by their staff card

 All guests must be issued a
guest pass sometime recently entering the
office

 All guests ought to be escorted by a part of the


company at any time within the office
 Secure areas which are special that require
staff PIN or staff card like server rooms ought
to not be open by unauthorized faculty or
visitors.

 Get to rights to secure regions must be updated


Protecting  Unsafe or combustible materials must be stored
Against appropriately and at a secure distance from any
External and areas keeping basic data or systems
Environmenta
l Threats  Back-up media or recovery equipment must be
sited at a remove absent from the main site

 The data center should be
utilized for quick recuperation after damaging
incidents

 Firefighting supplies must be introduced and
placed appropriately in accordance with the law

 Server rooms must NOT


be utilized as capacity areas especially paper or
cardboard

 All server and hardware racks must


be fastened to an adjacent strong surface

 All server rooms ought to have a positive


pressure environment such that
no unessential fabric is blown into the server
room

 Floor tiling must be laid accurately and


replaced immediately after any underfloor work
is done

Secure Areas  Secure regions areas should be known on


a need to know basis
 Avoiding unsurprised working in such areas

 Secure regions should be appropriately bolted a
nd periodically checked

 As it was authorized staff will get permitted to
the secure areas

 Limited access to the security room and the IT


manager must have the access and other
relevant staff
Public  Restriction of access of outsider to delivery and
Access, loading area and it should be limited to the
Delivery, and identified personnel
Loading
Areas  Keeping the record of the incoming and
outgoing materials through entry and exit.
Before reaching to the point of use, it must be
double-checked.

 The shipments that are incoming and outgoing


must be kept apart from each other.

REFERENCES:

A. Calder. (2005) Nine Steps to Success: An ISO 27001 Implementation Overview. London: IT

Governance Publishing.

Unknown Author. (2020) IT Governance, The One-Stop-Shop for everything to do with IT

Governance

Unknown Author. (2020) Legal Advantage, The Document Review Process


Anonymous (2005) ISO/IEC JTC 1/SC 27 Information security, cybersecurity, and privacy

protection

Bird, Katie (2020)  "NEW VERSION OF ISO/IEC 27001 TO BETTER TACKLE IT SECURITY

RISKS". iso.org. ISO.

Neha Yadav. (2019). The most common physical and network controls when implementing ISO

27001 in a data center

You might also like