17.7.006 N Iso - Iec 22237 6
17.7.006 N Iso - Iec 22237 6
17.7.006 N Iso - Iec 22237 6
IC 17.7.006
Norme Marocaine 2024
n e
ai
Information technology — Data centre facilities and
infrastructures — Part 6: Security systems
oc
Technologie de l’information — Installation et
ar
infrastructures de centres de traitement de données
— Partie 6: Systèmes de sécurité
M
e
m
or
N
Correspondance
oj
Droits d'auteur
Droit de reproduction réservés sauf prescription différente aucune partie de cette publication ne peut
être reproduite ni utilisée sous quelque forme que ce soit et par aucun procédé électronique ou
mécanique y compris la photocopie et les microfilms sans accord formel. Ce document est à usage
exclusif et non collectif des clients de l'IMANOR, Toute mise en réseau, reproduction et rediffusion, sous
quelque forme que ce soit, même partielle, sont strictement interdites.
Avant-Propos National
n e
Les normes marocaines sont élaborées et homologuées conformément aux dispositions de la Loi
N° 12-06 susmentionnée.
ai
La présente norme marocaine NM ISO/IEC 22237-6 a été examinée et adoptée par la
oc
commission de normalisation data center (139).
ar
M
e
m
or
N
de
et
oj
Pr
ISO/IEC 22237-6:2024(en)
Contents Page
Foreword....................................................................................................................................................................................................................................................... v
Introduction............................................................................................................................................................................................................................................ vi
1 Scope.............................................................................................................................................................................................................................................. 1
2 Normative references.................................................................................................................................................................................................. 1
3 Terms, definitions and abbreviated terms........................................................................................................................................... 2
e
3.1 Terms and definitions....................................................................................................................................................................................2
3.2 Abbreviated terms............................................................................................................................................................................................ 3
n
4 Conformance......................................................................................................................................................................................................................... 3
ai
5 Physical security............................................................................................................................................................................................................... 3
5.1 General.........................................................................................................................................................................................................................3
5.2 Risk analysis and management.............................................................................................................................................................4
oc
5.3 Designation of data centre spaces: Protection Classes.................................................................................................... 5
6 Protection against unauthorized access................................................................................................................................................. 5
6.1 General.........................................................................................................................................................................................................................5
ar
6.1.1 Data centre configuration........................................................................................................................................................ 5
6.1.2 Protection Classes...........................................................................................................................................................................5
6.1.3 Protection Classes of specific infrastructures......................................................................................................8
6.2
M
6.1.4 Levels for access control............................................................................................................................................................8
Access to the data centre premises.................................................................................................................................................... 8
6.2.1 Premises with external physical barriers.................................................................................................................8
6.2.2 Premises without external physical barriers.........................................................................................................9
e
6.2.3 Roofs.........................................................................................................................................................................................................10
6.2.4 Access routes....................................................................................................................................................................................10
m
6.2.5 Parking...................................................................................................................................................................................................11
6.2.6 Employees and visitors............................................................................................................................................................11
6.2.7 Pathways............................................................................................................................................................................................. 12
or
8 Protection against internal fire events (fire events igniting within data centre spaces)............... 18
8.1 General......................................................................................................................................................................................................................18
Pr
iii
ISO/IEC 22237-6:2024(en)
9 Protection against internal environmental events (other than fire within data centre
spaces)....................................................................................................................................................................................................................................... 23
9.1 General..................................................................................................................................................................................................................... 23
9.2 Implementation.................................................................................................................................................................................................24
9.2.1 Protection Class 1.........................................................................................................................................................................24
9.2.2 Protection Class 2.........................................................................................................................................................................24
9.2.3 Protection Class 3.........................................................................................................................................................................24
9.2.4 Protection Class 4........................................................................................................................................................................ 25
10 Protection against external environmental events (events outside the data centre
e
spaces)....................................................................................................................................................................................................................................... 25
10.1 General..................................................................................................................................................................................................................... 25
n
10.2 Implementation................................................................................................................................................................................................ 26
10.2.1 Protection Class 1........................................................................................................................................................................ 26
ai
10.2.2 Protection Class 2........................................................................................................................................................................ 26
10.2.3 Protection Class 3.........................................................................................................................................................................27
11 Systems to prevent unauthorized access and intrusion...................................................................................................... 27
oc
11.1 General......................................................................................................................................................................................................................27
11.2 Technology........................................................................................................................................................................................................... 28
11.2.1 Security lighting........................................................................................................................................................................... 28
ar
11.2.2 Video surveillance systems................................................................................................................................................ 28
11.2.3 Intruder and holdup alarm systems........................................................................................................................... 29
11.2.4 Access control systems........................................................................................................................................................... 29
M
11.2.5 Event and alarm monitoring.............................................................................................................................................. 30
Annex A (informative) Pressure relief: additional information..................................................................................................... 31
Bibliography.......................................................................................................................................................................................................................................... 33
e
m
or
N
de
et
oj
Pr
© ISO/IEC 2024 – All rights reserved
iv
ISO/IEC 22237-6:2024(en)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations,
governmental and non-governmental, in liaison with ISO and IEC, also take part in the work.
e
The procedures used to develop this document and those intended for its further maintenance are described
in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the different types
n
of document should be noted. This document was drafted in accordance with the editorial rules of the ISO/
IEC Directives, Part 2 (see www.iso.org/directives or www.iec.ch/members_experts/refdocs).
ai
ISO and IEC draw attention to the possibility that the implementation of this document may involve the
use of (a) patent(s). ISO and IEC take no position concerning the evidence, validity or applicability of any
oc
claimed patent rights in respect thereof. As of the date of publication of this document, ISO and IEC had not
received notice of (a) patent(s) which may be required to implement this document. However, implementers
are cautioned that this may not represent the latest information, which may be obtained from the patent
database available at www.iso.org/patents and https://patents.iec.ch. ISO and IEC shall not be held
ar
responsible for identifying any or all such patent rights.
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
M
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and expressions
related to conformity assessment, as well as information about ISO's adherence to the World Trade
e
Organization (WTO) principles in the Technical Barriers to Trade (TBT) see www.iso.org/iso/foreword.html.
In the IEC, see www.iec.ch/understanding-standards.
m
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 39, Sustainability, IT and data centres.
or
This first edition cancels and replaces ISO/IEC TS 22237-6:2018, which has been technically revised.
The main changes are as follows:
N
— a new Clause 7, "Protection against intrusion to data centre spaces", has been added. Clause 6 has been
restructured accordingly;
de
— references to relevant provisions of ISO/IEC 22237-2 have been added to highlight the respective links to
constructional requirements.
A list of all parts in the ISO/IEC 22237 series can be found on the ISO and IEC websites.
et
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing of these bodies can be found at www.iso.org/members.html and
www.iec.ch/national-committees.
oj
Pr
© ISO/IEC 2024 – All rights reserved
v
ISO/IEC 22237-6:2024(en)
Introduction
The unrestricted access to internet-based information demanded by the information society has led to an
exponential growth of both internet traffic and the volume of stored/retrieved data. Data centres house
and support the information technology and network telecommunications equipment for data processing,
data storage and data transport. They are required both by network operators (delivering those services to
customer premises) and by enterprises within those customer premises.
Data centres need to provide modular, scalable and flexible facilities and infrastructures to easily
e
accommodate the rapidly changing requirements of the market. In addition, energy consumption of data
centres has become critical, both from an environmental point of view (reduction of carbon footprint), and
n
with respect to economic considerations (cost of energy) for the data centre operator.
ai
The implementation of data centres varies in terms of:
a) purpose (enterprise, co-location, co-hosting or network operator facilities);
oc
b) security level;
c) physical size; and
ar
d) accommodation (mobile, temporary and permanent constructions).
NOTE Cloud services can be provided by all data centre types mentioned.
M
The needs of data centres also vary in terms of availability of service, the provision of security and the
objectives for energy efficiency. These needs and objectives influence the design of data centres in terms of
building construction, power distribution, environmental control, telecommunications cabling and physical
e
security. Effective management and operational information are required to monitor achievement of the
defined needs and objectives.
m
The ISO/IEC 22237 series specifies requirements and recommendations to support the various parties
involved in the design, planning, procurement, integration, installation, operation and maintenance of
or
2) consultants, architects, building designers and builders, system/installation designers, auditors, test
and commissioning agents;
3) suppliers of equipment; and
de
4) installers, maintainers.
The inter-relationship of the various documents within the ISO/IEC 22237 series at the time of publication is
shown in Figure 1.
et
oj
Pr
© ISO/IEC 2024 – All rights reserved
vi
ISO/IEC 22237-6:2024(en)
n e
ai
oc
ar
Figure 1 — Schematic relationship between the documents of the ISO/IEC 22237 series
M
ISO/IEC 22237-2 to ISO/IEC 22237-6 specify requirements and recommendations for particular facilities
and infrastructures to support the relevant classification for “availability”, “physical security” and “energy
efficiency enablement” according to ISO/IEC 22237−1.
e
This document, ISO/IEC 22237-6, addresses the physical security of facilities and infrastructure within data
m
centres together with the interfaces for monitoring the performance of those facilities and infrastructures
in line with ISO/IEC TS 22237-7 (in accordance with the requirements of ISO/IEC 22237-1).
or
ISO/IEC TS 22237-7 addresses the operational and management information (in accordance with the
requirements of ISO/IEC 22237-1.
N
This document is intended for use by and collaboration between architects, building designers and builders,
system and installation designers and security managers, among others.
The ISO/IEC 22237 series does not address the selection of information technology and network
de
© ISO/IEC 2024 – All rights reserved
vii
International Standard ISO/IEC 22237-6:2024(en)
e
Security systems
n
ai
1 Scope
This document specifies requirements and recommendations concerning the physical security of data
oc
centres based on the criteria and classifications for “availability”, “security” and “energy efficiency
enablement” within ISO/IEC 22237-1.
This document provides designations for the data centre spaces defined in ISO/IEC 22237-1.
ar
This document specifies requirements and recommendations for such data centre spaces, and the systems
employed within those spaces, in relation to protection against:
a)
M
unauthorized access addressing organizational and technological solutions;
b) intrusion;
e
c) internal fire events igniting within data centre spaces;
m
d) internal environmental events (other than fire) within the data centre spaces which would affect the
defined level of protection;
or
e) external environmental events outside the data centre spaces which would affect the defined level of
protection.
N
NOTE Constructional requirements and recommendations are provided by reference to ISO/IEC 22237-2.
Safety and electromagnetic compatibility (EMC) requirements are outside the scope of this document and
are covered by other standards and regulations. However, information given in this document can be of
de
2 Normative references
et
The following documents are referred to in the text in such a way that some or all of their content constitutes
requirements of this document. For dated references, only the edition cited applies. For undated references,
oj
the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 22237-1, Information technology — Data centre facilities and infrastructures — Part 1: General
Pr
concepts
ISO/IEC 22237-2, Information technology — Data centre facilities and infrastructures — Part 2: Building
construction
ISO/IEC 22237-3, Information technology — Data centre facilities and infrastructures — Part 3: Power
distribution
ISO/IEC 22237-4, Information technology — Data centre facilities and infrastructures — Part 4: Environmental
control
© ISO/IEC 2024 – All rights reserved
1
ISO/IEC 22237-6:2024(en)
IEC 60839-11-1, Alarm and electronic security systems — Part 11-1: Electronic access control systems — System
and components requirements
IEC 60839-11-2, Alarm and electronic security systems - Part 11-2: Electronic access control systems - Application
guidelines
IEC 62305 (all parts), Protection against lightning
IEC 62676-1-1, Video surveillance systems for use in security applications — Part 1-1: System requirements —
General
e
3 Terms, definitions and abbreviated terms
n
ai
3.1 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 22237-1 and the following
oc
apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
ar
— ISO Online browsing platform: available at https://w ww.iso.org/obp
— IEC Electropedia: available at https://w ww.electropedia.org/
3.1.1
authorized person
M
person having been assessed and subsequently provided with access credentials to specific areas within the
data centre
e
3.1.2
m
forcible threat
threat exhibited by physical force
or
3.1.3
frame
open construction, typically wall-mounted, for housing closures and other information technology
N
equipment
3.1.4
free-standing barrier
de
wall, fence, gate, turnstile or other similar self-supporting barrier, and their associated foundations, designed
to prevent entry to a space of a given Protection Class
[SOURCE: ISO/IEC 22237-2:2024, 3.1.2]
3.1.5
et
hold time
time during which a concentration of fire extinguishant is maintained at an effective level with the space
oj
being protected
3.1.6
Pr
© ISO/IEC 2024 – All rights reserved
2
ISO/IEC 22237-6:2024(en)
3.1.8
rack
open construction, typically self-supporting and floor-mounted, for housing closures and other information
technology equipment
3.1.9
residual risk
remaining risk(s) posed to the data centre assets requiring protection following the deployment of
appropriate countermeasures
e
3.1.10
surreptitious attack
n
compromise of an asset via logical or physical means with the objective that the attack remains undetected
3.1.11
ai
surreptitious threat
threat of a surreptitious attack by entities via logical or physical means leading to the compromise of that
oc
asset
ar
For the purposes of this document, the abbreviated terms given in ISO/IEC 22237-1 and the following apply.
I&HAS
VSS
intruder and holdup alarm systems
4 Conformance
For a data centre to conform to this document:
or
1) the required Protection Classes of Clause 5 shall be applied to each of the spaces of the data centre
according to the risk analysis of 5.2;
N
2) the requirements of the relevant Protection Class of Clauses 6, 7, 8, 9 and 10 shall be applied;
3) the systems to support the requirements of Clause 6 shall be in accordance with Clause 11.
de
5 Physical security
5.1 General
et
The degree of physical security applied to the facilities and infrastructures of a data centre has an influence
on both the availability of the data centre and the integrity/security of the data stored and processed within,
oj
requirements and recommendations for those data centre spaces, and the systems employed within those
spaces, address protection against:
a) unauthorized access (see Clause 6);
b) intrusion (see Clause 7);
c) fire events originating within data centres spaces (see Clause 8);
d) environmental events (other than fire) within the data centre spaces which would affect the defined
level of protection (see Clause 9);
© ISO/IEC 2024 – All rights reserved
3
ISO/IEC 22237-6:2024(en)
e) environmental events outside the data centre spaces which would affect the defined level of protection
(see Clause 10).
Constructional requirements for walls and penetrations are provided in ISO/IEC 22237-2 and relevant cross-
references are provided throughout this document.
e
— by the organization responsible for data centre assets;
n
— following a risk assessment based on the threats posed to the data (and the “classification” of the data)
and the processes hosted by the data centre. See ISO/IEC 22237-1 for further information regarding risk
ai
assessment methodologies.
Figure 2 illustrates the concept of the risk analysis and management and is described as follows:
oc
a) asset value analysis: a classification (“native”, or “raised” due to the effects of data aggregation) of the
assets should be determined at an early stage, so that it is possible to deploy appropriate protection
countermeasures;
ar
b) likelihood analysis: the probability of some form of attack against the protected assets;
c) forcible threat and surreptitious threat analysis: for example, posed by unauthorized access to the
M
assets resulting in loss or unavailability of the assets;
d) vulnerability analysis: for example, inadequate physical security or technical controls of the hosted
data.
e
m
or
N
de
These four items are analysed to identify the baseline risk posed to the data centre. Management of the
et
identified baseline risk employs appropriate technical, physical and procedural countermeasures or a
combination thereof at the appropriate security level.
oj
Following the deployment of baseline countermeasures, further decisions shall be taken relating to the
residual risk(s) as follows, driven by the acceptance of risk of the asset owner:
Pr
1) toleration — the remaining risk(s) are accepted and no additional countermeasures deployed;
2) treatment — additional measures are deployed to counter the remaining risk(s);
3) transferral — the risk(s) are transferred to another party, for example obtaining additional insurance
cover to mitigate the risk(s);
4) termination — the activity posing the risk is terminated.
© ISO/IEC 2024 – All rights reserved
4
ISO/IEC 22237-6:2024(en)
e
within an isolated structure does not need a fire compartment but requires protection against both
unauthorized access and intrusion.
n
The Protection Classes address the following aspects:
ai
a) protection against unauthorized access;
oc
b) protection against intrusion to data centre spaces;
c) protection against internal fire events igniting within data centre spaces;
ar
d) protection against internal environmental events (other than fire) within data centre spaces;
e) protection against external environmental events outside the data centre spaces.
between aspects. M
Each of these aspects are independent of each other. Protection Classes are not required to be aligned
In addition, the risk analysis of 5.2 together with the construction and configuration of the data centre
e
described in 6.2 will require the spaces of the data centre to be defined in terms of Protection Class for each
aspect of security.
m
The Protection Class system operates horizontally and vertically (e.g. risers, lift shafts, stair wells, atriums,
light-wells) for the buildings and structures.
or
6.1 General
de
The facilities and infrastructures of the data centre may be accommodated in part, or all, of a single building
or structure within the premises or may be distributed across several buildings or structures.
et
The implementation of barriers between areas of different Protection Classes in terms of protection
against unauthorized access is based on their physical construction. The protection can be supplemented
by technical and organizational measures. For example, free-standing barriers, external or internal walls
oj
of buildings, together with doors and other ducts, may be equipped with appropriate technical security
systems (see Clause 11) and supplemented by appropriate organizational processes.
Pr
This document defines four Protection Classes in relation to access to spaces accommodating the elements
of the different facilities and infrastructures, as detailed in Table 1.
© ISO/IEC 2024 – All rights reserved
5
ISO/IEC 22237-6:2024(en)
e
by persons author- or Class 3 areas shall
ized to access Class 3 be accompanied by
areas). persons authorized to
n
access Class 4 areas).
ai
The Protection Classes feature increasing levels of access control. The areas of the data centre requiring the
greatest physical protection against unauthorized access will be accommodated in spaces with the highest
Protection Class. Further guidance can be found in the IEC 60839-11 series.
oc
As a fundamental principle:
a) authorized persons have access to specific areas (or groups of areas) of a given Protection Class;
ar
b) authorized persons able to access specific areas (or groups of areas) of a given Protection Class do not
have automatic access to all areas of a lower Protection Class.
M
This subclause defines the rules for implementing such Protection Classes.
The access to spaces and systems shall be limited to the inevitable necessary operative minimum. This
e
applies to the aspects of spaces, time, personnel and knowledge. Physical security shall be implemented
according to the philosophy shown schematically in Figure 3, referred to as the “onion skin” or “defence in
m
depth” approach/model.
or
N
de
et
In order to be applicable to more general implementations of data centres, the simplistic model of Figure 3
can be visualized as a series of Protection Class islands as shown in Figure 4.
Pr
© ISO/IEC 2024 – All rights reserved
6
ISO/IEC 22237-6:2024(en)
n e
ai
Figure 4 — Protection Class islands
oc
Subclause 5.3 provides examples of the Protection Classes applied to data centre spaces but the technological
solutions for the control of unauthorized access vary across the particular data centre spaces within a
Protection Class.
ar
All elements of the border/barrier of an area with a given Protection Class shall have the same level of
resistance to unauthorized access. Where the data centre infrastructures specified in ISO/IEC 22237-2
to ISO/IEC 22237-6 cross boundaries from one Protection Class to another, they shall be provided with
NOTE M
protection suitable to the lower Protection Class interconnected as shown in Figure 5.
National or local regulations can prevent security measures from being applied to pathways (e.g.
maintenance holes, etc.) for infrastructures external to the premises.
e
m
or
N
de
et
Access control systems of a given Protection Class should be managed from areas with the same or higher
Protection Class.
Pr
Pathways of the data centre infrastructures (e.g. power supply, environmental control and
telecommunications cabling) shall be designed to prevent unauthorized passage between areas of different
Protection Class.
Data centres and their complementary functions of technical infrastructure shall be organized in areas
which mirror the needs of security, safety and availability of the data centre, and which match the assumed
risks and protection goals.
© ISO/IEC 2024 – All rights reserved
7
ISO/IEC 22237-6:2024(en)
The risk-bearing elements of the data centre should be located as far from the public or other unauthorized
personnel as possible. Where this is not practicable, additional protection measures can be required as
determined by the output of the risk assessment process or the site security assessment.
The requirements for the Protection Class which shall be applied to the elements of the following facilities
and infrastructures within the data centre are defined in:
a) ISO/IEC 22237-3 for the power distribution system;
e
b) ISO/IEC 22237-4 for the environmental control system;
n
NOTE Relevant requirements are also intended to be included in a future edition of ISO/IEC TS 22237-5 for the
ai
telecommunications cabling infrastructure.
oc
Table 2 describes four levels for access control to data centre spaces. The appropriate solution shall be
specified to allow the crossing of the boundary of each Protection Class. Information in 11.2.4 provides
details of the functionality options which can be applied.
ar
Table 2 — Examples for access control
Security level
1 (low)
Access control intensity
Manual access control (no
automation)
M Examples
Mechanical key and lock plus manual access log
e
2 (medium) Automated access control Using an electronic ID medium (e.g. card or other ID token) plus elec-
with single Factor authen- tronic access log
tication
m
3 (high) Automated access control Using an electronic ID medium (e.g. card or other ID token) together
with two Factor authenti- with another factor (e.g. PIN or biometry) plus electronic access log
or
cation
4 (very high) Enforced automated access Solutions to enforce the prevention of unregistered or unauthorized
control access or piggy-backing in addition to security level 3
N
If the premises are provided with an external physical barrier that provides a demarcation of Protection
Class 1, then, as shown in the example of Figure 6:
et
1) the number of penetrations of the boundary of Protection Class 1 for personnel and vehicular access
shall be minimized;
oj
2) the boundary of Protection Class 2 would represent the exterior walls and associated entrances of the
buildings and other structures comprising the data centre and its associated spaces;
Pr
3) the boundary of Protection Class 3 would represent the barrier between any entrances of buildings or
structures comprising the premises and the areas comprising the data centre and its associated spaces
(these spaces may be in separate buildings or structures of Protection Class 2);
4) the boundary of Protection Class 4 would represent the barrier between the entrance to the area
requiring Protection Class 3 and the area requiring Protection Class 4.
© ISO/IEC 2024 – All rights reserved
8
ISO/IEC 22237-6:2024(en)
n e
ai
oc
ar
Key
1, 2, 3, 4
A, B, C
Protection Class 1 to 4
buildings A, B, C
M
e
P premises boundary with physical barrier
m
Figure 6 — Example of Protection Classes applied to data centre premises with external barriers
or
If the premises enable full and unrestricted public access to the boundaries of the building(s) or other
N
structures, the exterior walls (or other defined internal barrier) of the building(s)/structures(s) represent
the boundary of Protection Class 1. In such a case, as shown in the example of Figure 7:
1) the number of penetrations of the boundary of Protection Class 1 for personnel and vehicular access
de
shall be minimized and these should be considered as points of surveillance and access detection;
2) the boundary of Protection Class 2 would represent the barrier between any entrances of buildings or
structures comprising the premises and the areas comprising the data centre and its associated spaces
(these spaces may be in separate buildings or structures of Protection Class 1);
et
3) the boundary of Protection Class 3 would represent the barrier between the entrance to the designated
data centre space and the area requiring Protection Class 3;
oj
4) the boundary of Protection Class 4 would represent the barrier between the entrance to the area
requiring Protection Class 3 and the area requiring Protection Class 4.
Pr
© ISO/IEC 2024 – All rights reserved
9
ISO/IEC 22237-6:2024(en)
n e
ai
oc
ar
Key
1, 2, 3, 4
A, B, C
Protection Class 1 to 4
buildings A, B, C
M
e
P premises boundary with physical barrier
m
Figure 7 — Example of Protection Classes applied to data centre premises without external barriers
or
6.2.3 Roofs
Appropriate barriers will be required to prevent unauthorized access to roof-top structures which
N
6.2.4.1 Requirements
Access routes shall be clearly signed to separate employees and visitors from deliveries to the data centre.
oj
Plans shall exist which address operation in situations where the primary access routes are unavailable.
Pr
6.2.4.2 Recommendations
© ISO/IEC 2024 – All rights reserved
10
ISO/IEC 22237-6:2024(en)
6.2.5 Parking
6.2.5.1 Requirements
The requirements of a given Protection Class address vehicular access to the premises containing the data
centre.
Consideration shall be given to and can place restrictions upon the designated location and minimum
e
distance from the data centre spaces of any parking areas for:
n
a) visitors and unauthorized vehicles;
ai
b) employees;
c) delivery vehicles;
oc
d) maintenance and emergency vehicles.
6.2.5.2 Recommendations
ar
Designated parking areas should be provided for visitors and other unauthorized vehicles.
Consideration should be given to:
a) M
video surveillance system (VSS) monitoring of the parking area;
b) location of the vehicle parking outside of the data centre perimeter;
e
c) lighting requirements;
m
e) passage of vehicle occupants from the parking location to the data centre, including access control
requirements;
f) operational security process requirements.
N
6.2.6.1 Requirements
Suitable space shall be allocated for the assessment and processing of employees and visitors in order to
provide them with appropriate access credentials as authorized persons.
et
This system shall include manual or automatic procedures to ensure that all physical access mechanisms
(e.g. keys, access cards, etc.) are returned or disabled without the loss of access by other authorized persons.
6.2.6.2 Recommendations
The use of anti-passback door controls should be considered based upon either the overall security
requirements of the data centre or to meet operational requirements.
Consideration should be given to VSS monitoring of access by authorized persons.
© ISO/IEC 2024 – All rights reserved
11
ISO/IEC 22237-6:2024(en)
6.2.7 Pathways
6.2.7.1 Requirements
Undesirable or unnecessary access to infrastructure components and equipment within pathways, where
justified according to the risk analysis of 5.2, shall be controlled by applying mechanical access control
and, where appropriate, by monitoring. Based on the necessary security level (which is based on the risk
assessment in 5.2), appropriate mitigation shall be provided when pathways of a given Protection Class pass
through areas of a lower Protection Class.
e
6.2.7.2 Recommendations
n
Consideration should be given to VSS monitoring.
ai
6.2.8 Cabinets, racks and frames
oc
6.2.8.1 Requirements
ar
electronic access control and, where appropriate, by monitoring unauthorized opening of the cabinets.
6.2.8.2 Recommendations
M
Consideration should be given to VSS monitoring of access by authorized persons.
e
6.3 Implementation
m
6.3.1.1 Requirements
or
6.3.1.1.1 Construction
N
6.3.1.2 Recommendations
et
6.3.1.2.1 Construction
© ISO/IEC 2024 – All rights reserved
12
ISO/IEC 22237-6:2024(en)
n e
6.3.2.1 General
ai
Outer boundaries of areas of Protection Class 2 may be co-located with those of Protection Class 1.
6.3.2.2 Requirements
oc
6.3.2.2.1 Construction
ar
Shall conform to ISO/IEC 22237-2.
M
The differing nature and function of the spaces serving the facilities and infrastructures of the data centre
can allow/demand separate rules for access provision (i.e. if the premises contain multiple buildings/
structures each which has specific functions or if the data centre spaces accommodate assets owned or
e
operated by multiple entities).
Any penetrations of the physical barrier defining the outer boundary of Protection Class 2 shall prevent
m
Any doors leading to the data centre spaces shall have appropriate door mechanisms in place to provide
access to authorized persons only.
de
Procedures shall be in place (e.g. by means of an interlock, inspection by security personnel or scanning
devices (examples see IEC 60839-11-1) to detect and prevent unauthorized access to the space.
Any opening of an emergency exit door shall trigger an alarm within the intrusion alarm system which
initiates an appropriate response.
et
6.3.2.3 Recommendations
oj
The number of penetrations of the barrier (excluding emergency exit doors) to allow general personnel
access to, and egress from, each area of Protection Class 2 should be minimized.
Pr
The selection and location of emergency exit routes (escape routes) should not enable access to areas of a
higher Protection Class.
© ISO/IEC 2024 – All rights reserved
13
ISO/IEC 22237-6:2024(en)
6.3.3.1 Requirements
6.3.3.1.1 Construction
e
Penetrations of the physical barrier defining the outer boundary of Protection Class 3 shall enable access
n
to authorized persons. Additional access credentials are required to allow authorized persons to be
accompanied by a defined number of persons having credentials to access areas of Protection Class 2.
ai
Based on the necessary security level for individual spaces, appropriate procedures shall be in place (e.g. by
means of an interlock, inspection by security personnel or scanning devices) to:
oc
a) detect and prevent unauthorized access to the space;
b) monitor and/or control materials and equipment entering and leaving areas of Protection Class 3 (unless
ar
implemented at the relevant boundary of Protection Class 4).
Such procedures shall take into account any requirements for emergency exit functionality and for any
vehicular access in emergency situations.
M
Any doors leading to the data centre spaces shall have appropriate door mechanisms in place to provide
access to authorized persons only.
e
Any penetrations of the physical barrier defining the outer boundary of Protection Class 3 shall prevent
vehicle access other than by emergency response vehicles unless accompanied by personnel authorized to
m
appropriate solution for such a function depends on the necessary security level.
6.3.3.2 Recommendations
N
The boundary of a Protection Class 3 area should not be co-located with boundaries to Protection Class 1.
The selection and location of emergency exit routes (escape routes) should not enable access to areas of
de
Protection Class 4.
6.3.4.1 Requirements
et
6.3.4.1.1 Construction
oj
Penetrations of the physical barrier defining the outer boundary of Protection Class 4 shall enable access
to authorized persons. Additional access credentials are required to allow authorized persons to be
accompanied by a defined number of persons having credentials to access areas of Protection Classes 2 and
3.
© ISO/IEC 2024 – All rights reserved
14
ISO/IEC 22237-6:2024(en)
Procedures shall be in place (e.g. by means of an interlock, inspection by security personnel or scanning
devices) to:
a) detect and prevent unauthorised access to the space;
b) monitor and/or control materials and equipment entering and leaving areas of Protection Class 4 (unless
implemented at a relevant boundary of Protection Class 3).
Any doors leading to the data centre spaces shall have appropriate door mechanisms in place to provide
access to authorized persons only.
e
Such procedures shall take into account any requirements for emergency exit functionality and for any
access in emergency situations.
n
Any opening of an emergency exit door shall trigger an alarm which initiates an appropriate response. The
ai
appropriate solution for such a function depends on the necessary security level.
oc
6.3.4.2 Recommendations
The boundary of a Protection Class 4 area should not be co-located with boundaries to Protection Classes 1
or 2.
ar
7 Protection against intrusion to data centre spaces
7.1 General
M
Appropriate protection against intrusion to data centre spaces depends on the necessary security level.
e
Adequate and effective protection against intrusion to data centre spaces requires a combination of
structural resistance (walls, doors, etc.), organizational measures and technical security measures.
m
Appropriate structural resistance and organizational measures are the foundation.
The determination of appropriate Protection Classes in relation to intrusion can follow the “onion skin”
or
boundary may differ depending upon the risk assessment associated with the equipment accommodated
or activities undertaken in each space. Information in 11.2.2 provides details of the functionality options
which can be applied.
Pr
© ISO/IEC 2024 – All rights reserved
15
ISO/IEC 22237-6:2024(en)
e
Boundary monitoring Motion detection
Door contact and breakage sensors
n
4 Video surveillance (Category “identify” of IEC 62676-4)
Complete space monitoring
Motion detection
ai
7.3 Implementation
oc
7.3.1 Protection Class 1
ar
7.3.1.1 Requirements
7.3.1.1.1 General
M
So far as is practicable, the construction of the boundary of Protection Class 1 together with the surveillance
systems surrounding that space shall be designed to detect and prevent intrusion in accordance with the
required security level which is determined by the risk assessment according to 5.2.
e
7.3.1.1.2 Construction
m
7.3.1.2 Recommendations
de
7.3.1.2.1 Surveillance
Areas of Protection Class 1 and, where possible, the area outside but in close proximity to the physical
barriers defining the outer boundary of Protection Class 1 should be subject to monitoring/surveillance and
should not contain objects (temporary or permanent) that would disrupt the effectiveness of monitoring/
et
surveillance (e.g. any plants should be low-growing, no parking outside designated areas, no shelters, etc).
See 11.2.2.2 for further information.
oj
7.3.2.1 Requirements
7.3.2.1.1 General
The construction of the boundary of Protection Class 2 together with the surveillance, intrusion detection
and response systems surrounding that space shall be designed to delay intrusion in accordance with the
required security level which is determined by the risk assessment according to 5.2.
© ISO/IEC 2024 – All rights reserved
16
ISO/IEC 22237-6:2024(en)
7.3.2.1.2 Construction
e
The response system to deter or detain potential intruders, following identification of potential intrusions,
shall be matched to the construction of the boundary.
n
7.3.2.2 Recommendations
ai
7.3.2.2.1 Construction
oc
See ISO/IEC 22237-2:2024, 8.6.1.
7.3.2.2.2 Surveillance
ar
Areas of Protection Class 2 and, where possible, the area outside but in close proximity to the physical
barriers defining the outer boundary of Protection Class 2 should be subject to monitoring/surveillance and
surveillance.
See 11.2.2.2 for further information.
M
should not contain objects (temporary or permanent) that would disrupt the effectiveness of monitoring/
e
7.3.3 Protection Class 3
m
7.3.3.1 Requirements
or
7.3.3.1.1 General
N
The construction of the boundary of Protection Class 3 together with the surveillance, intrusion detection
and response systems covered by this document surrounding that space shall be designed to prevent
intrusion in accordance with the required security level which is determined by the risk assessment
according to 5.2.
de
7.3.3.1.2 Construction
The response system to deter or detain potential intruders, following identification of potential intrusions,
shall be matched to the construction of the boundary.
© ISO/IEC 2024 – All rights reserved
17
ISO/IEC 22237-6:2024(en)
7.3.3.2 Recommendations
7.3.3.2.1 Surveillance
Areas of Protection Class 3 and, where possible, the area outside but in close proximity to the physical
barriers defining the outer boundary of Protection Class 3 should be subject to monitoring/surveillance and
should not contain objects (temporary or permanent) that would disrupt the effectiveness of monitoring/
surveillance.
See 11.2.2.2 for further information.
e
7.3.4 Protection Class 4
n
ai
7.3.4.1 Requirements
7.3.4.1.1 General
oc
The construction of the boundary of Protection Class 4 together with the surveillance, intrusion detection
and response systems covered by this document surrounding that space shall be designed to prevent
intrusion in accordance with the required security level which is determined by the risk assessment
ar
according to 5.2.
7.3.4.1.2 Construction
The response system to deter or detain potential intruders, following identification of potential intrusions,
shall be matched to the construction of the boundary.
N
7.3.4.2 Recommendations
7.3.4.2.1 Surveillance
de
Areas of Protection Class 4 and, where possible, the area outside but in close proximity to the physical
barriers defining the outer boundary of Protection Class 4 should be subject to monitoring/surveillance and
should not contain objects (temporary or permanent) that would disrupt the effectiveness of monitoring/
surveillance.
et
8 Protection against internal fire events (fire events igniting within data centre
spaces)
Pr
8.1 General
This document defines four Protection Classes in relation to fire originating within spaces accommodating
the elements of the different facilities and infrastructures, as detailed in Table 4.
© ISO/IEC 2024 – All rights reserved
18
ISO/IEC 22237-6:2024(en)
e
system. centre infrastruc-
in the outcome of risk
ture (e.g. generators,
assessment, by a fixed
switchgears) and with
n
firefighting system.
non-fixed firefighting
systems.
ai
NOTE 1 For the purposes of this clause, the term “fire suppression system” is synonymous with the term “fixed
firefighting system” adopted by CEN/TC 191.
oc
NOTE 2 For the purposes of this clause, the term “fire detection system” is synonymous with the term “fire
detection and alarm system” adopted by CEN/TC 72 and defined in EN 54–1.[12]
ar
It is presupposed that national or local regulations for fire detection, alarms and suppression are applied
in all spaces, independent of Protection Class. This clause addresses the fire detection and alarm, fixed and
portable firefighting systems to be applied to the data centre spaces. The impact of fire-fighting procedures
M
on the availability of the facilities and infrastructures in the data centre spaces shall be considered,
including fire-fighting procedures, which could require the disruption of all power supplies (including back-
up systems).
e
The type of fire detection system and firefighting systems selected for each space shall take into account the
Protection Class of the space and approach to be taken in maintaining the function of the space.
m
The Protection Classes feature increasing levels of fire detection and reaction. The areas of the data centre
requiring the greatest protection against internal fire events will be accommodated in spaces with the
or
8.1.2.1 Requirements
The data centre spaces shall be considered as a series of fire compartments, each with its own objectives for
de
The walls and barriers separating the fire compartments shall have a minimum fire rating in accordance
with the requirements of the highest Protection Class present at the boundary of the fire compartment.
oj
8.1.2.2 Recommendations
© ISO/IEC 2024 – All rights reserved
19
ISO/IEC 22237-6:2024(en)
8.1.3.1 Requirements
To support the objectives of Table 4 and independent of any requirements of national or local regulations,
fire detection and fire alarm systems shall be installed in data centre spaces of Protection Class 2 and above.
Consideration shall be given to the need for early detection of combustion products with pre-alarm. Where
used:
e
— components of the fire detection and alarm system shall take the applicable regional and national
standards into consideration.
n
NOTE 1 For Europe, relevant parts of the EN 54 series[11] are applicable.
ai
— the system shall take the applicable regional and national standards into consideration.
For Europe, EN 54-13[13] is applicable.
oc
NOTE 2
NOTE 3 For the US, NFPA 72,[32] NFPA 75[33] and NFPA 76[34] are applicable.
NOTE 4 For Japan; the Fire Service Act of Japan with related ordinance and local regulation are applicable.[40]
ar
Where used in spaces of Protection Class 3 and above, smoke detection (aspirating) systems shall take
applicable regional and national standards into consideration, respectively.
NOTE 5
M
For Europe, EN 54-20:2006,[14] Sensitivity Class A or B is applicable.
The method of monitoring alarms (see 11.2.5) shall be determined during the design of the fire detection
and alarm systems.
e
The time between the detection and activation of the suppression system shall allow the safe egress of
m
8.1.3.2 Recommendations
or
In the absence of national or local codes or regulations, ISO 7240-14 contains guidelines for the planning,
design, installation, commissioning, use and maintenance of fire detection and alarm systems.
N
An alarm should not automatically disrupt the function of the facilities and infrastructures of the data centre
de
(e.g. re-circulation of air within the fire compartments produced by the environmental control systems
should not be disrupted but the supply to fresh air into the fire compartment should be prevented).
8.1.4.1 General
oj
To support the objectives of Table 4, a fixed firefighting system shall be provided if it is deemed necessary in
the outcome of the risk analysis of 5.2.
Pr
If it is intended to install a fixed firefighting system either to extinguish an incipient fire in any part of the
protected space (including within cabinets) or to prevent a fire from spreading outside the protected space:
a) the system shall be designed to minimize hazards to personnel;
b) the system should be designed to minimize hazards to equipment;
c) the equipment accommodated within the space should be designed or located to maximize the efficiency
of the fixed fighting system.
© ISO/IEC 2024 – All rights reserved
20
ISO/IEC 22237-6:2024(en)
The selection of firefighting system can restrict the type of equipment to be accommodated within the
protected space.
The selection and implementation of specific solutions shall take into consideration the appropriate
standards and national or local regulations concerning their use.
See ISO/IEC 22237-2 for constructional requirements and recommendations to support the firefighting
systems selected.
e
It is presupposed that gaseous systems are designed, installed and maintained in accordance with national
n
or local regulations. In the absence of such regulations, the following standards should be considered:
ai
— for Europe: EN 15004 series[18] (for gases other than carbon dioxide);
— for the US: NFPA 2001[37] and NFPA 2010;[38]
oc
— for Japan: the Fire Service Act of Japan with related ordinance and local regulation is applicable;[40]
— ISO 6183 (for carbon dioxide systems) and for the US, NFPA 12.[31] However, carbon dioxide, which is
lethal at normal extinguishing concentrations, shall only be used in spaces within which appropriate
ar
procedures are in place to protect personnel.
Where gaseous extinguishing systems are used:
a)
M
to prevent loss of extinguishant through openings to adjacent hazards or work areas, any openings in
the boundaries of the protected space shall be either be provided with fixed seals or equipped with
automatic sealing systems and the predicted hold time shall be determined by the door fan test or a full
e
discharge test;
m
b) to avoid re-ignition from a persistent ignition source (e.g. heat source or “deep-seated” fire), the effective
concentration of extinguishant shall be maintained for the specified hold time by emergency actions
such as turning off the make-up air ventilation of the protected space;
or
c) in the absence of national or local regulations, the minimum hold time shall be 10 min but a longer time
shall be considered to reflect the predicted time to allow personnel to react to the fire and shut-down,
N
unauthorized access.
To avoid damage to buildings and equipment by excessively high or low pressure, pressure relief devices
shall be provided. See Annex A for further details.
The following additional factors shall be taken into account:
et
1) the mechanical (including acoustic), climatic and electromagnetic impact of the discharge of the gaseous
system on the equipment accommodated within the area served by the extinguishing system;
oj
2) the design calculations for the system should compensate for leakage of extinguishing agent where
necessary.
Pr
Oxygen reduction fire prevention systems maintain the oxygen at a reduced concentration to inhibit ignition
or spread of fire.
Oxygen reduction fire prevention systems shall be designed, installed and maintained taking into
consideration the applicable regional and national standards, respectively.
NOTE For Europe, EN 16750[20] is applicable.
© ISO/IEC 2024 – All rights reserved
21
ISO/IEC 22237-6:2024(en)
In the data centre spaces, any water-based systems shall be pre-action, i.e. the pipework is charged with air
or inert gas, with water introduced only after fire has been detected.
The two water-based technologies are:
a) sprinklers, which shall be designed, installed and maintained taking into consideration applicable
regional and national standards;
NOTE 1 For Europe, EN 12845[16] is applicable;
e
b) water mist, which shall be designed, installed and maintained taking into consideration applicable
n
regional and national standards.
ai
NOTE 2 For Europe, CEN/TS 14972[25] is applicable.
oc
The main purpose of water-based fire suppression systems is the protection of the building and spaces. For
the protection of electrical equipment, the risks of equipment damage associated with water-based systems
shall be considered.
ar
Where water-based fire suppression systems are used in conjunction with aisle containment within data
centre spaces, the sprinkler/nozzle layout shall be adjusted to ensure effective extinguishing of the fire
inside the containment.
M
If sprinkler/nozzle adjustment is not possible or desirable, the containment system should be adapted to
enable the water-based fire suppression systems to be effective using solutions such as:
e
1) a pivoting roof that opens when under specific conditions (e.g. a specified signal from a fire detection
and alarm system);
m
2) a roof system made of a material that weakens and collapses when heated due to a fire or collapses due
to the weight of the extinguishing water, if acceptable to national or local regulations.
or
Condensed aerosol systems should not be used in occupied spaces or in spaces containing electronic
equipment.
Condensed aerosol systems shall be designed, installed and maintained taking into consideration applicable
de
Foam systems should not be used in occupied spaces containing electronic equipment (e.g.
telecommunications spaces and computer room spaces).
Pr
Foam systems shall be designed, installed and maintained taking into consideration applicable regional and
national standards, respectively.
NOTE 1 For Europe, EN 13565-2[17] is applicable.
NOTE 2 For the US, NFPA 11[29] and NFPA 11A[30] are applicable.
© ISO/IEC 2024 – All rights reserved
22
ISO/IEC 22237-6:2024(en)
NOTE 3 For Japan, the Fire Service Act of Japan with related ordinance and local regulation is applicable.[40]
e
b) the number and location of portable fire extinguishers and the nature of the extinguishing agents shall
n
take into consideration national regulations and shall be in accordance with the outcome of a risk
assessment.
ai
8.2 Implementation
oc
8.2.1 Protection Class 1
ar
8.2.2 Protection Class 2
Areas of Protection Class 4 shall be provided with detection solutions in accordance with 8.1.3 and
suppression solutions in accordance with 8.1.5 and 8.1.4 (if required).
N
9 Protection against internal environmental events (other than fire within data
centre spaces)
de
9.1 General
This document defines four Protection Classes in relation to protection against internal environmental
events (other than the fire events of Clause 8) in spaces accommodating the elements of the different
et
© ISO/IEC 2024 – All rights reserved
23
ISO/IEC 22237-6:2024(en)
The Protection Classes feature increasing levels of resistance to internal environmental events. The areas
of the data centre requiring the greatest physical protection against internal environmental events will be
accommodated in spaces with the highest Protection Class.
In addition, consideration shall be given to the electromagnetic environment of the data centre spaces which
could disrupt the effective operation of data processing, data storage and data transfer and of the supporting
infrastructures.
Procurement, installation and operation of equipment shall consider the electromagnetic compatibility
characteristics of the data centre as a whole.
e
9.2 Implementation
n
9.2.1 Protection Class 1
ai
Not applicable.
oc
9.2.2 Protection Class 2
9.2.2.1 Requirements
ar
Areas of Protection Class 2 shall be provided with sensors able to detect the relevant internal environmental
events.
9.2.2.2 Recommendations
9.2.3.1 General
or
Areas of Protection Class 3 provide detection and mitigation when subject to internal environmental events.
N
9.2.3.2 Requirements
Areas of Protection Class 3 shall be provided with sensors able to detect the relevant internal environmental
events.
de
Drainage systems and other piping systems (including those of the environmental control systems of
ISO/IEC 22237-4) shall not be present unless suitable mitigation is applied in case of leakage.
Penetrations that may be opened to enable normal or emergency function of the data centre infrastructures
et
(such as pressure relief for gaseous extinguishing systems) shall, when closed, provide protection against
the ingress of contaminants (particulate, liquid or gaseous).
oj
Vibration shall be mitigated by dampers. Examples for dampers against seismic vibration can be found in
ISO/IEC TS 22237-30.
Pr
9.2.3.3 Recommendations
Where possible, mitigation should be implemented by the use of construction methods and materials.
Walls, ceilings and cable entries should provide protection against the ingress of contaminants (particulate,
liquid or gaseous) including water resulting from firefighting activity.
Areas of Protection Class 3 shall not be located underneath any openings in roof spaces unless drainage
routes are provided.
© ISO/IEC 2024 – All rights reserved
24
ISO/IEC 22237-6:2024(en)
9.2.4.1 General
Areas of Protection Class 4 provide detection and mitigation when subject to internal environmental events
within their area and provide protection against internal environmental events in surrounding spaces.
9.2.4.2 Requirements
Areas of Protection Class 4 shall be surrounded in three dimensions by areas of Protection Class 3.
e
The outer boundaries of Protection Class 4 may be co-located with those of Protection Class 3 provided they
n
are not penetrated from areas of a lower Protection Class.
ai
Areas of Protection Class 4 shall be provided with sensors able to detect the relevant internal events.
Walls, ceilings and cable entries shall provide protection against the ingress of contaminants (particulate,
oc
liquid or gaseous) including water resulting from firefighting activity.
Interior walls shall provide the desired degree of physical protection against internal environmental events.
ar
Where there is an identified risk of ingress of contaminants (including water resulting from firefighting
activity) from other spaces, mitigation shall be provided in the form of:
a) sealing;
b) detection;
c) drainage.
M
e
Areas of Protection Class 4 shall not be located underneath any openings in roof spaces unless drainage
m
9.2.4.3 Recommendations
N
Areas of Protection Class 4 shall not be located underneath any openings in roof spaces unless drainage
routes are provided.
Room-in-room constructions should provide environments consistently capable of conforming to the test
de
10 Protection against external environmental events (events outside the data centre
et
spaces)
oj
10.1 General
This document defines three Protection Classes in relation to protection against external environmental
Pr
events in spaces accommodating the elements of the different facilities and infrastructures as detailed in
Table 6. The requirements of the Protection Classes shall be applied when subject to identified risk.
Examples of external environmental events include fire, lightning, electromagnetic interference, vibration
(excluding seismic activity), flooding, gas and dust hazards.
© ISO/IEC 2024 – All rights reserved
25
ISO/IEC 22237-6:2024(en)
The Protection Classes feature increasing levels of resistance to external environmental events. The areas
of the data centre requiring the greatest physical protection against external environmental events will be
accommodated in spaces with the highest Protection Class.
e
Consideration shall be given to external sources of electromagnetic interference which could disrupt the
effective operation of data processing, data storage and data transport. Assessment of the electromagnetic
n
environment shall be undertaken in order to determine the need for any specific mitigation measures.
ai
If shielding of external mobile telephone signals is provided by a Protection Class boundary, then either:
a) mobile telephones shall be forbidden within the boundary; or
oc
b) a base station shall be provided within the boundary to prevent any mobile phones from becoming a
source of electromagnetic interference.
In the case of seismic activity, the guidance for planning and mitigation can be found in ISO/IEC TS 22237-30.
ar
10.2 Implementation
No requirements.
M
e
10.2.2 Protection Class 2
m
10.2.2.1 General
or
Areas of Protection Class 2 provide detection and mitigation when subject to external environmental events.
10.2.2.2 Requirements
N
Any penetrations of the boundaries to areas of Protection Class 2 which are open or could be opened to
enable normal or emergency function of the data centre infrastructures (such as pressure relief for gaseous
de
extinguishing systems) shall be provided with physical protection to prevent ingress of objects that might
damage or restrict that function. Such physical protection shall be taken into account in the functional
design of the penetration.
Buildings or structures accommodating areas of Protection Class 2 shall have a lightning protection system
et
in accordance with the IEC 62305 series. Where the building or structure has a mesh bonding network for
telecommunications equipment in accordance with ISO/IEC 30129, an “integrated lightning protection
system” according to IEC 62305-4 is preferred. Other lightning protection systems, including the “isolated
oj
lightning protection system” according to IEC 62305-3, may be used provided that specific restrictions are
applied as agreed between the planners of the lightning protection system and the bonding network.
Pr
10.2.2.3 Recommendations
Where possible, mitigation should be implemented by the use of construction methods and materials.
© ISO/IEC 2024 – All rights reserved
26
ISO/IEC 22237-6:2024(en)
10.2.3.1 General
10.2.3.2 Requirements
Areas of Protection Class 3 shall be surrounded in three dimensions by areas of Protection Class 2.
e
The outer boundaries of Protection Class 3 may be co-located with those of Protection Class 2 provided they
are not penetrated from areas of a lower Protection Class.
n
Walls, ceilings and cable entries shall provide protection against the ingress of contaminants (particulate,
ai
liquid or gaseous) including water resulting from firefighting activity.
10.2.3.3 Recommendations
oc
For further study.
ar
11 Systems to prevent unauthorized access and intrusion
11.1 General
M
Systems employed to prevent unauthorized access are comprised of a number of elements, as described in
Table 7.
e
Table 7 — Elements of systems for the prevention of unauthorized access
m
received the appropriate training to ensure the security system will function
correctly in support of operational needs. Relevant and applicable background
checks should have been performed to manage and mitigate insider threats.
In situations requiring the highest security level, personnel will require ad-
N
integrate with all systems necessary for the secure operation of the site. For
example, processes in relation to the management and handling of visitors to
the site, and the receipt and processing of deliveries to the site.
Physical Appropriate physical controls will be designed and operated on the site, Clause 6 and Clause 7
providing the relevant classes of protection. The nature, number and type of
et
The selection and implementation of specific solutions shall be in accordance with the appropriate
Pr
standards. It is presupposed that statutory and regulatory requirements are considered in the selection and
implementation process. Appropriate references are provided in 11.2.2 and 11.2.3.
NOTE For example, for Europe, CLC/TS 50398[26] provides guidance on the integration of alarms and other
systems.
© ISO/IEC 2024 – All rights reserved
27
ISO/IEC 22237-6:2024(en)
11.2 Technology
Correct deployment of security lighting will provide an effective deterrent against intruders and support
the use of VSS monitoring (see 11.2.2). The lighting should be deployed in strategic locations, particularly at
site entry points. The correct deployment of lighting will aid and support mobile site security patrols.
Specialist advice should be obtained in order to select the appropriate lighting technology as a variety of
solutions exist.
e
Security lighting should provide a minimum of 10 lux and should be deployed such that deep shadows are
n
avoided around the data centre spaces being protected.
ai
Security lighting at external perimeter barriers should be directed inwards to enable intruders to be
identified directly or by silhouette.
oc
In appropriate circumstances, additional security lighting may be installed which is ground-based behind
the boundary fence line. This lighting would face outwards and provides an effective light shield, making
observation of activities behind this light barrier difficult during hours of darkness.
ar
Lighting should be controlled by a photoelectric cell, timers or other means. An appropriate selection of
controls should be in place to protect the lights from being tampered with or disabled.
11.2.2.1 Requirements
M
e
Where justified and based on the needed security level (see 7.2), which is determined by the output of the
risk assessment of 5.2, the video surveillance system (VSS) shall meet the requirements of the appropriate
m
Grade of IEC 62676-1-1, which is selected in line with the necessary security level.
The requirements for each VSS shall be determined taking into account:
or
a) what is under surveillance, i.e. “hot spots” (e.g. entrances, escape doors, loading bays), boundaries or
complete spaces;
N
b) the nature of the surveillance, i.e. simple monitoring, recording or recording with a system for video
analysis;
de
c) the requirements for management of all the video channels and the need for false-alarm-proof video
analytics algorithms to minimize human involvement.
11.2.2.2 Recommendations
et
c) windows, doors and roof tops of the data centre premises and spaces.
Appropriate tests should be performed to ensure the system operates and provides the desired image
quality in all expected weather and lighting conditions.
Internal cameras should be positioned to monitor:
1) approaches to specific data centre spaces;
2) entry/egress from areas of one Protection Class to another or between areas of a given Protection Class;
© ISO/IEC 2024 – All rights reserved
28
ISO/IEC 22237-6:2024(en)
e
secured area, with only authorized access permitted (e.g. on-site guarding personnel). Recorded images
shall be retained in accordance with local data protection regulations. If no such regulation exists, then the
n
images should be retained for a minimum of 31 days.
ai
Use and recording of images for the prevention and detection of crime shall take into consideration national
or local regulations.
oc
11.2.3 Intruder and holdup alarm systems
11.2.3.1 Requirements
ar
Where justified and based on the necessary security level (see 7.2), which is determined by the output of
the risk assessment of 5.2, the intruder and hold-up alarm system (I&HAS) shall take into consideration the
Specialist advice should be obtained in order to select the appropriate I&HAS technology as a variety of
solutions exist.
or
Critical areas and other areas indicated by a risk assessment or operational requirements should be
monitored and supported by an intruder detection system. Where there is an operational requirement, or
N
requirement indicated by the results of a risk assessment indicating that a local police response is required,
the system shall send an alert that conforms with the requirements or the alarm receiver.
Responses to the activation of the intruder detection system will be incorporated into the local site operating
de
procedures.
11.2.4.1 Requirements
et
Where justified and based on the necessary security level (see 6.1.4), which is determined by the output
of the risk assessment of 5.2, the access control system shall meet the requirements of IEC 60839-11-1 and
oj
IEC 60839-11-2 with the security grade selected in line with the necessary security level.
NOTE Further information is provided in IEC 60839–11–2.
Pr
The requirements for each element of the access control system shall be determined taking into account:
— the type of control (i.e. mechanical lock, electronic lock, intercom system);
— the directionality of boundary access control (i.e. uni-directional, bi-directional);
— the prevention of passback;
— the prevention of repeated use of access technology;
© ISO/IEC 2024 – All rights reserved
29
ISO/IEC 22237-6:2024(en)
— alarm generation upon access attempt without prior authorization (sabotage protection);
— the application of timed access controls for certain spaces.
11.2.4.2 Recommendations
Integration of the access control system (e.g. electronic locks and sensors with the VSS system) should be
considered. Utilization of a combination of different authentication methods (card, PIN, biometrics, etc.)
should be considered.
e
11.2.5 Event and alarm monitoring
n
Systems and facilities for the remote monitoring of alarms shall take into consideration the applicable
regional and national standards, respectively. It should be ensured that security systems used have a
ai
coordinated time.
NOTE For Europe, the EN 50136 series[22] and EN 50518[23] are applicable.
oc
ar
M
e
m
or
N
de
et
oj
Pr
© ISO/IEC 2024 – All rights reserved
30
ISO/IEC 22237-6:2024(en)
Annex A
(informative)
e
A.1 General
n
The following information is typically considered by designers of a firefighting system which requires the
provision of pressure relief (both under- and over-pressure) within the spaces served.
ai
A.2 Design considerations
oc
Where required following the assessment:
a) each structurally segregated area within the protected space should be equipped with a separate
ar
pressure relief device or other means of pressure relief;
b) the pressure relief device should be installed so as to make sure that it is not positioned in the immediate
c)
discharge area of the nozzles of the extinguishing system;
M
the pressure required for opening should be higher than the geodetic pressure generated by the
extinguishing gas at the level of the pressure relief vent (if the extinguishing gas is heavier than air, a
geodetic pressure builds up in the lower part of the room depending on the density ratio of extinguishing
e
gas/air and on the room height. Pressure relief devices opening by over-pressure and installed in
m
the lower part of the room could cause the extinguishing gas to escape after the flooding process, in
particular under the effect of leaks in the upper part of the room);
d) pressure relief should not be provided by means of active exhaust suction devices;
or
e) the pressure relief device should be sufficiently dimensioned, taking into the account the allowable
overpressure in the room, the maximum mass flow during the activation of the extinguishing process
N
and the type of pressure relief (resistance coefficient of the vent, pressure drop in a duct);
f) in order to avoid personal and property damage, the fire and extinguishing gases released by the
pressure relief device should not result in a hazard outside the extinguishing zone.
de
For this reason, the pressure relief should lead directly through a vent into the open.
If pressure relief into the open requires the use of a duct:
et
1) the pressure drop of the duct should be calculated additionally and considered for the dimensioning
of the cross-sectional surface;
oj
2) the duct should be suitable for taking up both the pressures and the gas flows;
3) the duct should be sufficiently gas tight and should not be equipped with other outlets;
Pr
4) the duct should be designed so as to make sure that during pressure relief the fire is prevented from
spreading into other areas and that damage of the duct resulting in a failure can be excluded.
In exceptional cases where pressure relief is possible only via ventilation system, the above requirements
apply to the ducts used. Account should be taken of the flow velocities and the possible failure of the
shut-off devices.
g) the pressure relief device should close after completed pressure relief and equalization of room
pressure;
© ISO/IEC 2024 – All rights reserved
31
ISO/IEC 22237-6:2024(en)
h) pressure relief devices depending on an external power supply should be triggered directly by the
extinguishing system or by the component triggering the extinguishing system and should be energized
by one of those using non-electrical energy;
i) where electrically triggered pressure relief devices are used:
1) guidelines for the triggering of extinguishing systems should apply;
2) they should be provided with a monitored back-up power supply adequate for guaranteeing
sufficient pressure relief for the specified hold time;
e
3) if pressure relief is provided by means of a vent or a duct directly into the open and if no regulations
for fire protection in terms of a fire resistant segregation of the perimeter walls containing the
n
pressure relief vents is observed, louvered shutters may be used which open as a result of their
own weight or via reset springs at a certain overpressure in the room, i.e. switching into an inclined
ai
position and returning to home position after a decrease of pressure, thus closing the aperture.
If pressure relief is provided by means of a fire rated vent which complies to the fire resistant
oc
segregation of the perimeter walls, louvered shutters/flaps may be used which open at a certain
overpressure in the room and close by their own weight or via reset springs, i.e. switching into
an inclined position and returning to home position after a decrease of pressure, thus closing the
aperture;
ar
4) as an alternative, pressure relief shutters or vents may be used which are opened and closed e.g.
by a pressure container which is directly controlled (i.e. opened and closed) by the extinguishing
M
system. If requirements in terms of a structural segregation are to be observed, the pressure relief
devices should be designed accordingly.
e
m
or
N
de
et
oj
Pr
© ISO/IEC 2024 – All rights reserved
32
ISO/IEC 22237-6:2024(en)
Bibliography
[1] ISO/IEC/TS 22237-7, Information technology — Data centre facilities and infrastructures — Part 7:
Management and operational information
[2] ISO/IEC/TS 22237-30, Information technology — Data centre facilities and infrastructures — Part 30:
Earthquake risk and impact analysis
e
[3] ISO/IEC 30129, Information technology — Telecommunications bonding networks for buildings and
other structures
n
[4] IEC 60839-11-31, Alarm and electronic security systems — Part 11-31: Electronic access control
ai
systems — IP interoperability implementation based on Web services — Core specification
[5] IEC 60839-11-32, Alarm and electronic security systems — Part 11-32: Electronic access control
oc
systems — IP interoperability implementation based on Web services — Access control specification
[6] IEC 62676 (all parts), Video surveillance systems for use in security applications
IEC 62676-4, Video surveillance systems for use in security applications - Part 4: Application guidelines
ar
[7]
[8] ISO 6183, Fire protection equipment — Carbon dioxide extinguishing systems for use on premises —
Design and installation
[9]
M
ISO 7240-14, Fire detection and alarm systems — Part 14: Design, installation, commissioning and
service of fire detection and fire alarm systems in and around buildings
e
[10] EN 3 (all parts), Portable fire extinguishers
m
[11] EN 54 (all parts), Fire detection and fire alarm systems
[12] EN 54-1, Fire detection and fire alarm systems — Part 1: Introduction
or
[13] EN 54-13, Fire detection and fire alarm systems — Part 13: Compatibility and connectability assessment
of system components
N
[14] EN 54-20:2006, Fire detection and fire alarm systems — Part 20: Aspirating smoke detectors
[15] EN 1047-2, Secure storage units - Classification and methods of test for resistance to fire - Part 2: Data
rooms and data container
de
[16] EN 12845, Fixed firefighting systems — Automatic sprinkler systems — Design, installation and
maintenance
[17] EN 13565-2, Fixed firefighting systems — Foam systems — Part 2: Design, construction and maintenance
et
[18] EN 15004 (all parts), Fixed firefighting systems — Gas extinguishing systems
[19] EN 15276-2, Fixed firefighting systems — Condensed aerosol extinguishing systems — Part 2: Design,
oj
maintenance
[21] EN 50131 (all parts), Alarm systems — Intrusion and hold-up systems
[22] EN 50136 (all parts), Alarm systems — Alarm transmission systems and equipment
[23] EN 50518 (all parts), Monitoring and alarm receiving centre
[24] CEN/TS 54-14, Fire detection and fire alarm systems — Part 14: Guidelines for planning, design,
installation, commissioning, use and maintenance
© ISO/IEC 2024 – All rights reserved
33
ISO/IEC 22237-6:2024(en)
[25] CEN/TS 14972, Fixed firefighting systems — Watermist systems — Design and installation
[26] CLC/TS 50398, Alarm systems — Combined and integrated alarm systems — General requirements
[27] JIS Z 9290-(all parts), Protection against lightning
[28] NFPA 10, Standard for portable fire extinguishers
[29] NFPA 11, Standard for low-, medium-, and high-expansion foam
[30] NFPA 11A, Standard for Medium- and High-Expansion Foam Systems
e
[31] NFPA 12, Standard on carbon dioxide extinguishing systems
n
[32] NFPA 72, National fire alarm and signaling code
ai
[33] NFPA 75, Standard for the fire protection of information technology equipment
[34] NFPA 76, Standard for the fire protection of telecommunications facilities
oc
[35] NFPA 750, Standard on water mist fire protection systems
[36] NFPA 780, Standard for the installation of lightning protection systems
ar
[37] NFPA 2001, Standard on clean agent fire extinguishing systems
[38]
[39] M
NFPA 2010, Standard for fixed aerosol fire-extinguishing systems
ISO/IEC/TS 22237-5, Information technology — Data centre facilities and infrastructures — Part 5:
Telecommunications cabling infrastructure
e
[40] Fire Service Act of Japan
m
or
N
de
et
oj
Pr
© ISO/IEC 2024 – All rights reserved
34