Neha Yadav
February 26, 2019
Security controls for Data Centers are becoming a huge challenge due to increasing numbers of devices and equipment being added. In this article you will see how to build an ISO 27001 compliant Data Center by identification and effective implementation of information security controls. The article summarizes ISO 27001 Data Center requirements and helps you improve its security.
A Data Center is basically a building or a dedicated space which hosts all critical systems or Information Technology infrastructure of an organization. The number of security attacks, including those affecting Data Centers are increasing day by day. Data Centers contain all the critical information of organizations; therefore, information security is a matter of concern. A Data Center must maintain high standards for assuring the confidentiality, integrity and availability of its hosted IT (Information Technology) environment.
To understand the importance of ISO 27001 certification from the perspective of a CEO of an independent Data Center, read the article ISO 27001 Case study for data centers: An interview with Goran Djoreski.
The best approach to select security controls for a Data Center should be to start with a risk assessment. In a risk assessment, you analyze the threats, vulnerabilities and risks that can be present for a Data Center. The risk assessment methodology can be the same as you are using for ISO 27001, if you are certified in it. If not, feel free to define your own methodology for risk assessment.
To learn more about risk assessment, read the article ISO 27001 risk assessment: How to match assets, threats and vulnerabilities.
The following are examples of the most common threats to Data Centers:
The most common weaknesses in Data Centers are related to the following areas:
Based on the list of risks identified, each risk shall be mapped to security controls, that can be chosen from ISO 27001 (Annex A controls) or security controls from other local/international information security standards.
There are various types of the controls that can be implemented to mitigate identified risks, but this article will focus only on physical controls and virtual/network controls.
The physical security of a Data Center is the set of protocols that prevent any kind of physical damage to the systems that store the organization’s critical data. The selected security controls should be able to handle everything ranging from natural disasters to corporate espionage to terrorist attacks. To understand about the protection of secure areas please read the article Physical security in ISO 27001: How to protect the secure areas.
Examples of physical security controls include the following:
Virtual security or network security are measures put in place to prevent any unauthorized access that will affect the confidentiality, integrity or availability of data stored on servers or computing devices. To understand the access control in ISO 27001, please read the article How to handle access control according to ISO 27001.
Network security is quite difficult to handle as there are multiple ways to compromise the network of an organization. The biggest challenge of network security is that methods of hacking or network attacks evolve year after year. For example, a hacker may decide to use a malware, or malicious software, to bypass the various firewalls and gain access to the organization’s critical information. Old systems may put security at risk because they do not contain modern methods of data security. Also, with increasing popularity of teleworking, there is a risk of virtual attacks. For more about teleworking, please read the article How to apply information security controls in teleworking according to ISO 27001.
Virtual attacks can be prevented by using the below techniques:
As explained above, it is important to conduct a risk assessment and implement appropriate security controls in order to achieve compliance to ISO 27001, ensuring a secure Data Center. The IT infrastructure of any organization is mainly dependent on the hardware (like servers, storage, etc.) which is in the Data Center. This means that, whenever an organization implements ISO 27001 or other information security standards, the organization needs to consider the above-mentioned risk assessment for the Data Center to fully protect the data.
To learn how to comply with ISO 27001, while also implementing privacy and cybersecurity controls, sign up for a 14-day free trial of Conformio, the leading ISO 27001 compliance software.