Data Center Controls
Data Center Controls
<COMPANY NAME>
DATA CENTER CONTROLS ASSESSMENT
Location:
Date:
Client Personnel:
E&Y Interviewer:
Contents
Contents________________________________________________________________________________________________________________2
CLIENT CONFIDENTIAL
1
THREAT AND RISK ASSESSMENT QUESTIONNAIRE & TARGET CONTROLS
CLIENT CONFIDENTIAL
2
THREAT AND RISK ASSESSMENT QUESTIONNAIRE & TARGET CONTROLS
CLIENT CONFIDENTIAL
3
THREAT AND RISK ASSESSMENT QUESTIONNAIRE & TARGET CONTROLS
excessive heat?
12 Are you aware of the property(s) physical limitations relative
to your business operations?
13 How many ways can the property(s) be accessed, i.e., street,
below grade, front, back, side, roof, utility easements, pipes,
bridges, trains, buses, garage and lobbies?
14 Is there a site security manager at every site?
15 What criteria has been established for ground floor
architectural barriers and conditioning, i.e. crash barriers,
bullet resistant glass and walls, window bars, door control,
loading dock access and control, vents and penetrations, utility
access points?
16 Is there a single point of access established for all individuals
entering the property?
17 Are emergency power-off switches clearly labeled, shielded to
prevent accidental activation, and located both inside and
outside the data center?
18 Is all building wiring placed in fire resistant panels and
conduits (prefer under fire resistant raised computer room
floor).
CLIENT CONFIDENTIAL
4
THREAT AND RISK ASSESSMENT QUESTIONNAIRE & TARGET CONTROLS
CLIENT CONFIDENTIAL
6
THREAT AND RISK ASSESSMENT QUESTIONNAIRE & TARGET CONTROLS
from going below the 2nd floor (or to the data center) in the
event of a “Code Red” condition?
19 Is there a lock all doors mode that will secure doors to exterior
of sensitive areas (generally not allowed by fire codes)?
20 Have the doors, hardware, monitoring devices been specified
and designed to a recognized industry standard?
21 How often are these features tested?
22 Are bolting door lock keys stamped “do not duplicate”, issued
to only authorized personnel, and issuance logs reviewed?
23 Are combination door lock combinations regularly changed or
whenever an employee with access is transferred or
terminated?
24 Evaluate proper security of physical entry points:
All entry doors
Glass windows and walls
Movable walls and modular cubicles
Above suspended ceilings and beneath raised floors
Ventilation systems
Over a curtain, fake wall.
CLIENT CONFIDENTIAL
11
THREAT AND RISK ASSESSMENT QUESTIONNAIRE & TARGET CONTROLS
Section 11 – Lighting
CLIENT CONFIDENTIAL
14
THREAT AND RISK ASSESSMENT QUESTIONNAIRE & TARGET CONTROLS
CLIENT CONFIDENTIAL
15
THREAT AND RISK ASSESSMENT QUESTIONNAIRE & TARGET CONTROLS
CLIENT CONFIDENTIAL
17
THREAT AND RISK ASSESSMENT QUESTIONNAIRE & TARGET CONTROLS
CLIENT CONFIDENTIAL
18