This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.

Physical security for today’s industrial data storage environment

03 May 2019

According to the Gabriel Consulting Group 2011 the Data Centre Security Survey concluded that more than 60 percent of all malicious attacks on datacentres are by insiders – contrary to what one might think from all the clamour about electronic data protection.

So, it is the people in our own companies who are physical security threats, the insiders have access to authorised cards, and sometimes cards other than their own. 

Management’s assessment of vulnerability is often skewed, and the resultant risk assessment consequently flawed. In most cases this is derived from a cost avoidance mentality. The same issue also often leads to poor communications between IT staff and management.

We can therefore consider physical security on a spectrum:

• Very low level – no access restriction but protection of personnel and equipment required – a simple wing knob latch may be enough
• General access limited, and equipment protection needed – but a simple key system is needed – perhaps a quarter turn lock with a triangular key
• Restricted access and equipment protection – but low value or risk – a higher security key system is appropriate; a profile cylinder key lock would be a suitable choice.
• Higher risk or value – perhaps requiring an electronic mechanism e.g. specialist private manufacturing establishments or research centres. 
• Very high risk/value e.g. data centres or utilities where a comprehensive logging/monitoring and control system is vital – remotely accessible e.g. via an encrypted internet link.

Read the full article in the May issue of DPA

Contact Details and Archive...

Print this page | E-mail this page

Hammond White Paper