Computer Center Security and Controls
Computer Center Security and Controls
CONTROLS
COMPUTER CENTER CONTROLS
Since the computer resides in an environment which has a critical impact
on its continual operation and availability, site design requires careful planning to
insure an environment that will not adversely affect the computer center's
reliability and security.
With that objective, several key control features that contribute directly to
computer center security are established.
A. Physical Location
The physical location selected for a computer center can influence the risk of disaster. To the
extent possible, the computer center should be located away from human-made and natural
hazards, such as processing plants, gas and water mains, airports, high-crime areas, flood
plains and geological faults.
B. Construction
Ideally, a computer center should be located in a single-story building of solid construction
with controlled access. Utility (power and telephone) and communications lines should be
underground. The building windows should not open. An air filtration system should be in
place that is capable of excluding pollens, dust, and dust mites.
C. Access
Access to the computer should be limited to the operators and other employees who work
there. Programmers and analysts who occasionally need to correct program errors should
maintain accurate records of all such events to verify function of access control. The main
entrance to the computer should be a single door, although fire exits with alarms are necessary.
To achieve a higher level of security, closed-circuit cameras and video recording systems
should monitor access.
D. Air Conditioning
Computers functions best in an air-conditioned environment. For mainframe computers,
providing adequate air conditioning is often a requirement of the vendor’s warranty.
Computers operate best in a temperature range of 70 to 75 degrees Fahrenheit and a relative
humidity of 50 percent. Logic errors can occur in computer hardware when temperature depart
significantly from this range.
E. Fire Suppression
The most common threat to a firm’s computer equipment is fire. Half of the companies that
suffer fires go out of business because of the loss of critical records, such as accounts
receivable. The implementation of an effective fire-suppression system requires consultation
with specialists.
The audit objectives are to determine whether: (1) controls governing computer
center security are adequate to reasonably protect the organization from physical
damage or losses; (2) insurance coverage on equipment is adequate to compensate
the organization for the destruction of, or damage to, its computer center; and (3)
operator documentation is adequate to deal with system failure as well as routine
operations.
AUDIT PROCEDURES FOR ASSESSING
PHYSICAL SECURITY CONTROLS
The auditor should obtain architectural plans to determine that the computer center is solidly
built of fireproof material. There should be adequate drainage under the raised floor to allow
water to flow away in the event of water damage from a fire in an upper floor or from some
other source. In addition, the auditor should assess the physical location of the computer
center. The facility should be located in an area that minimizes its exposure to fire, civil unrest,
and other hazards.
B. Tests of the Fire Detection System
The auditor should establish that fire detection and suppression equipment, both manual and
automatic, are in place and are tested regularly. The fire detection system should detect smoke,
heat and combustible fumes. The evidence may be obtained by reviewing official fire marshal
records of tests, which are stored at the computer center.