Home Sponsor Post: The Concentric Rings of Data Center Security

Sponsor Post: The Concentric Rings of Data Center Security

Editor’s note: We offer our long-term sponsors the opportunity to write posts and tell their story. These posts are clearly marked as written by sponsors, but we also want them to be useful and interesting to our readers. We hope you like the posts and we encourage you to support our sponsors by trying out their products.

In security, it’s pragmatism that counts. You don’t want to overreact in devoting company time, effort and finances on any security measures “just because”, but you definitely want to allocate these resources towards what is best for you. One way to do that is by understanding the varying rings of security that begin at your servers and expand outward to the walls of the data center itself.

At Rackspace, we like to picture hosting security as many layers building on top of each other. The foundation of good security is established in the data center. On top of that are layered the security preventions and protocols of the networking, device, OS, application infrastructure, application and business process floors.

Each layer, or floor, of the security house has different considerations and best practices that should be accounted for. Regarding the data center layer, which is the subject matter of this post, two data center managers at Rackspace, Wayne Bell and Cormack Lawler, provided some helpful input.

A safe data center environment is established by concentric rings of security.

The outermost ring of data center security is comprised of the exterior of the actual center. The shell of the building is the most basic line of defense housing a data center in an unmarked building. Having cameras at entry and exit points and having no exterior windows onto the center’s floor are all ways exterior security can be tightened. In regards to data center physical security, Lawler says “you can either be the most threatening guy on the block” or be hidden entirely. Both options can work.

The second component of exterior armament is access. Who gets into the data center? This can be regulated through some basic means: ID checks at the door, no cameras or phones allowed within the building, no one allowed on the actual data center floor. Access can be even further restricted to sensitive areas within the facility by limiting which employees actually have to be there. For example, if those employees in charge of product supplies don’t need to be in the electrical room, then that access should not be allowed.

After the exterior of the compound, the power level comprises the next ring of security. Best practices for the data center industry are to have power enter facilities via underground channels. Additionally, power units should be encased in concrete conduits, and transformer units should be padlocked so only the electrical company has access. Once power enters the data center, electrical distribution rooms should become restricted access arenas.

The actual data center floor comprises the innermost circle of security. Bell points out that at the most simple level, “On the floor, security becomes a personnel issue.” If someone can physically get their hands on your server, they can access the information stored within it. A lot of the risk inherent to a data center floor can be mitigated by highly limited access. Enabling employees to self regulate also can contribute to a safer environment.

As we move through the different floors of the security hierarchy, each layer will form a foundation for those that come after it. Moving through an online environment layer by layer may help to isolate risk throughout the data center.

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the tech industry for major developments, new product launches, AI breakthroughs, video game releases and other newsworthy events. Editors assign relevant stories to staff writers or freelance contributors with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Get the biggest tech headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Tech News

    Explore the latest in tech with our Tech News. We cut through the noise for concise, relevant updates, keeping you informed about the rapidly evolving tech landscape with curated content that separates signal from noise.

    In-Depth Tech Stories

    Explore tech impact in In-Depth Stories. Narrative data journalism offers comprehensive analyses, revealing stories behind data. Understand industry trends for a deeper perspective on tech's intricate relationships with society.

    Expert Reviews

    Empower decisions with Expert Reviews, merging industry expertise and insightful analysis. Delve into tech intricacies, get the best deals, and stay ahead with our trustworthy guide to navigating the ever-changing tech market.