Datacenter Security (DCS)

Implement physical security perimeters to safeguard personnel, data, and information systems. Establish physical security perimeters between the administrative and business areas and the data storage and processing facilities areas.


Login

Datacenter Security (DCS)

Use equipment identification as a method for connection authentication.


Login

Datacenter Security (DCS)

Allow only authorized personnel access to secure areas, with all ingress and egress points restricted, documented, and monitored by physical access control mechanisms. Retain access control records on a periodic basis as deemed appropriate by the organization.


Login

Datacenter Security (DCS)

Implement, maintain, and operate datacenter surveillance systems at the external perimeter and at all the ingress and egress points to detect unauthorized ingress and egress attempts.


Login

Datacenter Security (DCS)

Train datacenter personnel to respond to unauthorized ingress or egress attempts.


Login

Datacenter Security (DCS)

Level N/A

Define, implement and evaluate processes, procedures and technical measures that ensure a risk-based protection of power and telecommunication cables from a threat of interception, interference or damage at all facilities, offices and rooms.


Login

Datacenter Security (DCS)

Implement and maintain data center environmental control systems that monitor, maintain and test for continual effectiveness the temperature and humidity conditions within accepted industry standards.


Login

Datacenter Security (DCS)

Level N/A

Secure, monitor, maintain, and test utilities services for continual effectiveness at planned intervals.


Login

Datacenter Security (DCS)

Level N/A

Keep business-critical equipment away from locations subject to high probability for environmental risk events.


Login

Data Security and Privacy Lifecycle Management (DSP)

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for the classification, protection and handling of data throughout its lifecycle, and according to all applicable laws and regulations, standards, and risk level. Review and update the policies and procedures at least annually.


Login