You are on page 1of 2

Page 30 Processor.

com November 16, 2012

HOW TO

Secure Data Center


Racks & Cabinets
Access Cards, Biometrics Seen As Key Elements In Overall Plan

Randomly poll stakeholders about that card-access systems are less secure cabinets unprotected. Orischak points to
what they feel their enterprise’s most valu- than manual key-based systems. Still, are last year’s security breach at the Health Key Points
able asset is, and the answer will most there data center scenarios in which access Net data center in Rancho Cordova, Calif.,
likely be related to data. It makes sense cards can prove sufficient? as an example. “In the Health Net case, the r Many experts consider access card-
then that data center managers go to great “Whenever I’m asked this question, my card access control system proved ineffec- based security systems as less secure
lengths to protect that asset. Traditionally, response is the same: What level of risk are tive,” he says. Such a system doesn’t show than other systems, including manual
one means of securing data centers has you willing to live with in the data center?,” “who is passing through the access point; it key-based solutions.
been the use of security access cards, Orischak says. As he sees it, card-based sys- only tells you what card is passing through r Attacks perpetrated by employees
including at the individual rack and cabinet tems are still only used because enterprises the access point.” possessing access cards, or those who
level. The question, however, is whether have legacy card systems installed at build- can obtain access cards, pose one of the
access cards still are the best option for ing and room access points, and they want See The Big Security Picture biggest risks to enterprises.
securing racks and cabinets or if a security to prolong their investment. Info-Tech Research Group analyst
upgrade is in order. Typically, Orischak says, data centers Jenna Maertz says two primary issues typ- r Security systems based on biometrics are
embrace a military-style, reduced-concen- ically prevent greater adoption of rack- a viable option to access cards. Costs of
Understand The Limitations tric circle, card-based security scheme with and cabinet-level security. First, many solutions have come down considerably in
Of Access Cards the idea being to reduce the speed of an server OEMs design cabinets so that recent years.
According to David Orischak, CEO attack before it reaches the core, or the it’s incredibly difficult to close the cab-
of Digitus Biometrics (www.digitus data center. An intruder who does reach inet’s back. “The cabinets comply with that are unable to secure the back of
-biometrics.com), security experts agree the core, he says, will usually find server width standards, but we have customers the cabinet because of the length being
November 16, 2012 Processor.com Page 31

introduced by some server OEMs,” she concentric circle access control,” he says. fingerprint recognition system, iris scan- swipes her card and then places her hand
says. Enterprises, she says, “might not be “The attackers are already on the inside.” ner, or other device. “Much of this is dic- on a biometric reader,” she says. “This
able to retroactively install security at this Maertz says Info-Tech advises its custom- tated by budget,” he says. Clark notes that helps ensure that they didn’t just pass
level on existing infrastructure.” Second, ers to review employee access rights as rack-mountable cameras are also avail- off the access card to another employ-
many enterprises view data center secu- often as possible but at least annually. able. Once a server cabinet is opened, ee.” Biometrics technology, she says, is
rity from a top-down, entire-footprint A risk specific to access cards, she says, the camera snaps network-distributable becoming more commonplace, and some
perspective as opposed to securing indi- is the possibility of approved employ- shots to identify who is inside the cabi- options, such as fingerprint readers, can be
vidual pieces. The mentality, she says, is ees bringing guests into secure locations, net. Additionally, most server room-level installed fairly inexpensively.
“why secure each part individually when which is a “huge security breach.” KVM switches provide additional security Overall, cabinet-level security costs
you could secure the whole?” via the OSD system, which prevents key- have dropped dramatically in the past year,
Orischak says the majority of malicious Equip Yourself board/mouse access without a password. Orischak says. “With the appearance of
attacks on data centers are conducted by Jeff Clark, president and general man- Orischak says most experts agree that energy efficient bus-based systems, the
insiders, which is why no enterprise can ager of Lindy USA (888/865-4639; www biometrics is the best alternative for secur- cost to biometrically secure a cabinet can
ignore the security risk created by insid- .lindy-usa.com), says “real” data cen- ing mission-critical facilities. Biometric be less than $500,” he says. “In situations
ers, including where racks and cabinets ter security consists of multiple layers solutions are now less expensive to pur- where the cabinets are already installed,
are concerned. Beyond having greater and starts by defining who has access chase and operate than card-based sys- there may be some costs associated with
access to cards, insiders’ mobility is sel- to the server room. Start with a locking tems, he says. Maertz points out that many modification of the lock opening on the
dom questioned, he says. This fact “neu- mechanism at the door, he says, whether newer access cards can be programmed cabinet door and/or the modification or
ters the idea of perimeter-based, reduced it’s a key-coded system, badge scanner, to include biometrics. “The employee replacement of the door.” P

Top Tips Action Plan


✔ Use this equation. For all organizations, securing data center racks starts with ■ Determine if security is need-
assessing how much risk the organization is willing to live with, says David Orischak, ed more at the rack/cabinet-
CEO of Digitus Biometrics (www.digitus-biometrics.com). He says the standard risk level or entire data center.
equation is: Risk = Threat x Cost x Vulnerability, and vulnerability is the only variable
■ If an upgrade is necessary,
a data center manager can control. “If a data center manager is uncomfortable with
determine what your budget is.
the current level of risk, he must try to reduce vulnerability,” Orischak says. “Dollars
spent on cabinet-level security reduce vulnerability more so than dollars spent else- ■ Know what your regulatory
where in the data center.” and compliance requirements

✔ Guard USB ports. Jeff Clark, president and general manager of Lindy USA are and ensure the potential
solution meets them.
(888/865-4639; www.lindy-usa.com), says that in addition to racks and cabinets, data
center managers need to consider guarding USB ports in an effort to protect enter- ■ Ensure you can centrally man-
prise data. USB port blockers can prevent authorized access. “Keep in mind that your age cabinet access in real-time,
network is protected from the outside by your firewall. With a thumb drive, a person produce and communicate
can easily introduce unwelcome software applications into a network through the alerts, and generate audit trails
USB port,” he says. “Not only that, they can retrieve and save sensitive data such as related to cabinet access.
credit card numbers, classified documents, etc.” 
■ Determine which type of rack/
✔ Make certain that upgrades make sense. Info-Tech Research Group analyst Jenna cabinet security solution best
Maertz advises small to midsized enterprises to take caution before investing money suits your data center.
and effort into upgrading rack/cabinet security, as “there may be use cases in which
this is appropriate and sufficient,” but for some enterprises, it may make ■ Compare the solutions’ initial
sense to focus attention on securing the entire data center. and ongoing costs.

Get Started
Before choosing a cabinet-level security solution, make sure to ask several questions first, says David Orischak, CEO of Digitus
Biometrics (www.digitus-biometrics.com). Questions include: What is the initial purchase price, how secure is the solution, what are the
ongoing system operating costs (cards, powering the system, maintenance, etc.), can the system meet regulatory and compliance needs,
is it easy to operate, and is it compatible with the operating environment?

You might also like