VISC Data Center Physical Control Guideline

advertisement
VISC Data Center Physical Control
Guideline
VISC Data Center Physical Control
REVISION CONTROL
Document Title:
VISC Data Center Physical Control
Author:
VISC Document Committee
File Reference:
InfoSec Standard Template_Numbered Headings.docx
Revision History
Revision Date
Revised By
Summary of Revisions
Section(s) Revised
12-22-2011
Danita Leese
Formatted
All
12-13-2011
Sylvia Barnes
Incorporate review changes and place into approved
template.
Click here to enter
Sections Revised.
10-19-2011
Sylvia Barnes
Reformatted document and removed redundancies
All
10-9-2011
Mark Hendricks
Draft document
All
Review / Approval History
Review Date
Reviewed By
Action (Reviewed, Recommended or Approved)
10-31-2011
VISC Governance
Draft VISC Document
2/7/2012
VIAC Governance
Approve
Last Revised: 12/22/11
Page ii
VISC Data Center Physical Control
Table of Contents
Page
1.0
INTRODUCTION .............................................................................................................................................. 4
2.0
PURPOSE ........................................................................................................................................................ 4
3.0
SCOPE ............................................................................................................................................................. 4
4.0
GUIDELINE ....................................................................................................................................................... 4
4.1
Data Center Physical Control .................................................................................................................. 4
4.2
Data Center Access Authorization .......................................................................................................... 6
4.3
Data Center Access Requirements ......................................................................................................... 6
4.4
Unrestricted Data Center Access ............................................................................................................ 7
4.5
Access Limited to Authorized Personnel Only ........................................................................................ 7
4.6
Authorization for Unrestricted and Restricted Access to Data Center Spaces ....................................... 7
4.6.1
4.7
Visitor Access ............................................................................................................................. 7
Audit Procedures ..................................................................................................................................... 8
4.7.1
Equipment in the Data Center .................................................................................................... 8
5.0
DEFINITIONS ................................................................................................................................................... 8
6.0
REFERENCES ................................................................................................................................................. 8
Last Revised: 12/22/11
Page iii
VISC Data Center Physical Control
1.0
INTRODUCTION
This guideline was developed to support the CSU Policies, government regulations and audit compliance. This
guideline provides support for managing physical and environmental security controls to prevent unauthorized
physical access, damage, and interruption to campus information assets controlled within a data center
environment.
2.0
PURPOSE
The following data center physical control guideline is designed to provide procedures and support for managing
security to information assets within a data center with additional management controls for other assets that
process Level 1 and Level 2 data that may reside outside a data center. These controls will need to be adequate
to protect critical or protected data, and such controls need to:
a. Manage control of physical access to information assets (including personal computer systems, computer
terminals, and mobile devices) by campus staff and others.
b. Prevent, detect, suppress fire, water damage, and loss or disruption of operational capabilities due to
electrical power fluctuations or failures.
c.
Have appropriate security zone designations assigned to physical areas where Level 1 and Level 2 data
are processed. Appropriate physical controls need to be implemented in shared and limited access
security zones. Campuses should implement an access review process and review these controls
regularly.
3.0
SCOPE
This document is intended to address physical controls for campus limited access areas such as campus data
centers. This document is intended to implement section 8080 of the CSU Information Security Policy and
associated standards related to physical control for campus data centers. This document addresses access
procedures, as well as physical and environmental control guidelines.
4.0
GUIDELINE
4.1
Data Center Physical Control
Campus Data Centers are Limited Access Areas based on CSU’s Policy Section 8080 Physical Security
Standard. Information Technology should implement an access control list that includes the name and access
level of each individual granted restricted or unrestricted access. A copy of the access list should be maintained
both in the Information Technology office and at the University Police Department. A standard process should be
implemented to manage changes to the access list.
Last Revised: 00/00/00
Page 4 of 8
VISC Data Center Physical Control
4.1.1
Data Center Physical Controls
Campus Data Centers are Limited Access Areas based on CSU’s Policy Section 8080 Physical Security
Standard. Campus and/or departmental servers storing Level 1 Confidential data, as defined by the CSU
Information Security Standards, should be located in a physically controlled campus Data Center.
Data Center Guideline:
1. Campus Data Centers should be alarmed with a 24/7 alerting system with real time alerts reporting to
an outside department or agency like a University Police Department. A process should be
implemented in which the Information Security Officer or the Chief Information Officer or their
designee should be contacted in the event that an alarm is triggered.
2. All work areas should be kept clean and free of debris. Upon completion of any work in the room, staff
performing the work should ensure they have left the area as clean as it was before their work began.
3. All rack enclosures should be kept neat and free of manuals, diskettes, cables, etc. Doors on all racks
should remain closed at all times except during performed work.
4. Cables should never be strung outside of rack enclosures. Cabling between rack enclosures of
adjacent racks is accepted provided a sufficient pass-through chassis is in place.
5. Campus Data Centers should have processes and facilities in place to prevent, detect, suppress fire,
water damage, and loss or disruption of operational capabilities due to electrical power fluctuations or
failures.
6. Measures should be taken to prevent Tailgating or Piggybacking which is when a person tags along
with another person who is authorized to gain entry into a restricted area. Individuals with key access
may not allow any other person to follow unless they are certain that the trailing individual has
access.
7. Data Center Machine Room Etiquette

No food or drink is allowed within the Data Center.

No hazardous materials are allowed within the Data Center.

Do not power any electrical or mechanical device without proper authorization.

All packing material should be removed from computer equipment/components in the specified
staging areas before being moved into the Data Center. This includes cardboard, paper wrap,
peanuts, plastic, wood and other such materials.

No cleaning supply is allowed within the Data Center without prior approval. This includes water.

Only HEPA filter vacuums may be used inside the Data Center.

No cutting of any material (pipes, floor tiles etc.) should be performed inside the Data Center
unless special arrangements are made in advance.

Boxes, tapes, CDs and other material should not be stored inside the Data Center.

Employees authorized to access any portion of the Data Center should only access equipment for
which they are specifically responsible.

Only staff with unrestricted access should access the sub-floor or remove floor tile.
Last Revised: 00/00/00
Page 5 of 8
VISC Data Center Physical Control
4.2

Do not lift floor tiles without prior knowledge, consent, and oversight of the Network Operations
staff.

Communicate all problems to Data Center staff.

In the event of an emergency notify Data Center staff immediately.

Do not touch a Power Distribution Unit within the Data Center.

Do not touch air conditioning equipment.

Do not open communications cabinets.
Data Center Access Authorization
All requests for access to the campus Data Center need to be approved by the Chief Information Officer (CIO) or
designee. Access is restricted to specific individuals with job functions related to operating mission critical
equipment in the Data Center. The CIO or designee must approve all changes to physical controls, such as, locks
and alarm codes. Data Center management and access authorization procedures should be developed and
implemented to maintain baseline security for the Data Center and the protected assets.
Other best practices that should be implemented in the management of the Data Center are as follows:

A Campus Limited Access Area Authorization Form needs to be completed for each employee.
The form will include information pertaining to the responsibilities of those with privileged access.

The supervisor of the employee will need to sign the authorization form.

The Chief Technology Officer (CTO) or designee will need to sign the authorization form.

Employees, Public Safety, Facilities and Maintenance and contractors that are granted access
should have a signed Confidentiality Agreement on file.

Employees, public safety, and contractors will need to have completed appropriate Data Center
Physical Access Training as defined by the Information Security Officer (ISO) or designee.

After CIO approval, the Director of (CTO) will file the authorization form and request key cards
and security codes.

Lock and Alarm Updates Procedures.

All changes to Lock or Alarm access for a Data Center will need to be approved by the CIO or
Designee.

The employee’s name will be added to the “Data Center Access Control List”.

The access control process should be re-authorized annually on or near July 1st. The Data
Center Access Control list will be maintained within easy visual proximity to the controlled spaces,
and with the University Police Department.
4.3
Data Center Access Requirements
Data Centers should be equipped with key card swipe or numeric keypad access controls. Individuals prior to
being granted any unrestricted or unescorted physical access will need to:

Have a signed confidentiality agreement on file

Complete a "Live Scan" background check

Complete Data Center Access Training as defined by the Information Security Officer (ISO)
Last Revised: 00/00/00
Page 6 of 8
VISC Data Center Physical Control

Virtual Access - Devices with virtual access to Data Center Assets, such as remote consoles, should be
secured with unique passwords and only access Level 1 systems with Virtual Private Network (VPN)
connections.
4.4
Unrestricted Data Center Access
Unrestricted Access is limited to campus employees, and consists of unlimited, unrestricted access to all areas
within the Campus Data Center. Personnel granted unrestricted physical access are assigned card key
authorization and provided individual alarm codes for campus Data Center spaces to which they require access
as part of their job function. Personnel with unrestricted physical access are allowed un-escorted access as
needed to these rooms at any time; including off-hour access to otherwise closed buildings. Unrestricted physical
access is normally restricted to the System and Network Administration teams within Information Technology
Services.
Employees with unrestricted access may escort individuals without specific approval from the CIO or Designee.
4.5
Access Limited to Authorized Personnel Only
Physical access to the Data Center spaces should be restricted to those with operational need to enter those
spaces. Access is non-transferable. Staff and Administrators should not be permitted to share their keys, key
cards, or alarm codes and should not bring any guests (children, siblings, spouses, colleagues or friends) into the
Data Center at any time without prior approval by the CIO or designee.
4.6
Authorization for Unrestricted and Restricted Access to Data Center Spaces
4.6.1
Visitor Access
Anyone who does not have unrestricted or restricted authorization is considered a visitor. All visitors to the Data
Center will need to adhere to facility guidelines and other best practices as detailed below:
1. Visitors that require access to the Data Center spaces should provide 48 hours advance notice prior
to arrival.
2. Visitors that will be performing work or maintenance on systems or infrastructure should be validated
against names provided in advance by employers.
3. All visitors to Data Center Spaces will be accompanied at all times by an individual with unrestricted
access and need to be entered into the visitor log. All exceptions will need to have prior approval by
the Chief Information Officer (CIO) or designee.
4. Visitors will need to be signed in when entering the campus Data Center to document the time and
purpose of their visit, and will need to sign out when leaving.
Last Revised: 00/00/00
Page 7 of 8
VISC Data Center Physical Control
4.7
Audit Procedures
The Information Security Officer or designee should review the list of authorized employees on a biannual basis
(January and June) and verify against signed Authorization forms. Equipment installations and removals should
also be reviewed.
4.7.1
Equipment in the Data Center
In order to enhance security and reduce the chance for disruptions, the following policies apply to all equipment
housed in the Data Center:
1. Advance consultation with Enterprise Technology on all hardware and network related procurements
to be housed in the Data Center is required prior to placing orders to ensure the products and/or
services best meet client needs and are certified for standard 19” racks and related power, HVAC,
etc., requirements.
2. An Equipment Form process should be implemented and forms should be completed for all
equipment installations and removals in either the Restricted or Unrestricted zones of the Data
Center. Equipment Forms should be made available from Information Technology.
3. Information Technology should deny access to the Data Center to anyone who intends to install or
remove equipment without some type of change management, installation form or file process being
followed. Equipment surreptitiously installed without prior change management submission in the
unrestricted zone during off-hours may result in a cancellation of authorization for access and
removal of all unapproved equipment from the Data Center.
5.0
DEFINITIONS
HEPA - High-Efficiency Particulate Air is a type of air filter that satisfies certain standards of efficiency.
HVAC – Heating, Ventilating and Air Conditioning air filter.
6.0
REFERENCES
California State University Policy Section 8080
Last Revised: 00/00/00
Page 8 of 8
Download