A Five Layer View of Data Center Systems Security Joa Eng 0322
A Five Layer View of Data Center Systems Security Joa Eng 0322
T
he data center is the central nervous inside data centers. Data centers are not like typical
system for any organization. As the hub workspaces that allow frequent access and casual
of servers that host business-critical data, visits. These first-level checks and controls are
the data center needs special attention. essential for data security.
There are some basic checks required for keeping IT
• Locking controls for server racks—It is necessary
systems safe in the data center. It is imperative for IT
to prohibit external device access to servers and
systems auditors and system maintenance teams to
guard against potential data leakage through
understand these checkpoints.
unauthorized cable connections. Locking controls
help prevent data theft and physical disruptions.
In addition to checking information security
practices and defensive mechanisms, it is equally • Checks for security breaches at the hardware
important to assess backup procedures and level—For remote monitoring of hardware, the
practices to strengthen the organization’s resilience usual practice is to connect base hardware to
following a security attack. The rule of thumb is
that information security audits should assess the
confidentiality, integrity and availability (CIA) triad.
FIGURE 1
The Five Layers of Data Center
Systems Security
Physical
Logical
Network
Application
Information Security
R AV I S H A N K A R V E M U R I
The Physical Layer Is an IT infrastructure manager with ACT Fibernet, an India-based Internet
The perimeter layer meant for protecting the systems service provider. He has had multiple opportunities to implement state-of-
hosted inside the data center is the physical layer. the-art compute, storage and network systems. Vemuri has helped deploy
Practices of protection at the physical layer include highly efficient disaster recovery solutions and identity management
access controls for data center rooms, racks, servers and enterprise backup solutions for safeguarding critical data, managed
and entry processes. Protections also ensure checks for multiple operating system (OS) environments, and participated in complex
availability of data copies at different physical locations. application and storage migrations. Prior to ACT Fibernet, he worked in the
banking and telecom industries, primarily in IT and telecom infrastructure
• Data center physical access controls—It is management roles. In his 19 years of experience, Vemuri has managed
important to set up multifactor authentication diverse environments in IT infrastructure, IT development, telecom
(MFA) for accessing data centers and to maintain operations and project management roles.
surveillance controls at entry and exit points and
© 2022 ISACA. All rights reserved. www.isaca.org VOLUME 2 | 2022 ISACA JOURNAL 1
generation defensive mechanisms to secure OS
“Because not much outgoing traffic is expected instances, and adoption of best practices and
processes related to the work OS footprint.
from the virtualization layer, Internet access can
• Virtualization layer security—This layer is easy
be restricted for the most part.” to handle. Version updates, port hardening and
Internet blocking usually require only a few services
running on top of the virtualization layer to control
the network. However, revalidation of the ingress traffic. Simple Network Management
connectivity requirements is necessary for Protocol (SNMP) and some limited specific
proper access control. services are required for monitoring. Therefore, it
is easy to implement restrictions on ingress loads.
• Firmware upgrades—Original equipment
Because not much outgoing traffic is expected
manufacturers (OEMs) are the best judges to
from the virtualization layer, Internet access can be
advise on firmware upgrades. Infrastructure teams
restricted for the most part. Organizations should
should take manufacturers’ recommendations
keep virtualization software updated to avoid
to upgrade firmware to safer and more stable
security bugs common in older versions.
versions.
• Regular patching and removal of old and
• Process checks for exiting employees—Removing
unsupported operating systems—As a security
physical access must be included in the exit
defense mechanism, patching is a nonnegotiable,
formalities for all employees leaving the organization.
regular operating activity for data center teams.
Human resources (HR) and IT teams must coordinate
For example, Microsoft releases security patches
to regularly reconcile the access list.
for Windows operating systems on the second
• Access to external agencies—Temporary access Tuesday of every month. Operations teams must
to hardware vendor support teams must be closed complete these patches in a timely manner, as they
immediately after the support ends. In the case of the fix all known bugs. Many leading OS manufacturers
cloud, there is a higher scope for such measures given sunset older versions and stop releasing security
the scale of operations and client audits. patches for them. Thus, organizations need to be
• Disaster recovery strategies, off site backup ready to move away from older OS versions. This
procedures and business continuity plans—Building requires advanced planning and execution.
resilience is important to counter disruptions such • OS installation—It is always better to start with
as earthquakes, fire accidents or other catastrophic safe installation practices. This approach helps to
events. Factors such as degree of criticality of data, avoid both vulnerabilities and downtime once the
recovery point objective/recovery time objective instance is put into production. Some of the key
(RPO/RTO) and regulatory compliance requirements practices are changing default security settings
are important elements of disaster recovery (DR) and passwords, avoiding unnecessary packages,
design strategies. These strategies should include secure shell (SSH) hardening, and server hardening
such considerations as location of the DR site, practices. The principle of least privileges should
scope of applications, size of hardware, bandwidth be adopted when providing user access. This
requirements between the data center and DR sites, means that only appropriate privileges are given
data replication methods, and frequency of DR to users based on the requirement. A casual and
failover/failback activities. The main focus here is on liberal approach to this process is not safe.
physical availability of a data copy in a cross-location
• Secured login through PAM tools, two-factor
site. In the case of a natural disaster, the goal is to be
authentication—Logical access controls primarily
adequately equipped to recover critical data.
help to counter brute-force attacks and guard
against unauthorized access. Privileged Access
Logical Layer
Management (PAM) tools are useful to establish
The logical layer refers to the operating system (OS)
single sign-on requirements, and they offer strong
environment. Protecting the logical layer addresses
password management features. These tools
security of the virtualization layer, optimization
make it easy to maintain access logs and help
of the OS footprint, use of traditional and next-
ensure audit compliance requirements.
4 ISACA JOURNAL VOLUME 2 | 2022 © 2022 ISACA. All rights reserved. www.isaca.org
ensure blocking mode is used for all critical public-
facing applications under WAF.
“The five-layer view covers all
• Safe coding and database installation practices—
It is always best to do things right in the initial aspects related to the security
stages of application building. of data center systems and it
• Application code backups and database backup
procedures—Keeping at least two backups is
consolidates them all into one
recommended (one in the same location and one comprehensive guide.”
cross-location copy).
© 2022 ISACA. All rights reserved. www.isaca.org VOLUME 2 | 2022 ISACA JOURNAL 5
Conclusion At the application level, the focus is two-fold: how
to secure applications from attacks and how to
Basic checks are required for keeping IT systems
secure business-critical data. At the information
safe in a data center. These checks can be viewed
security layer, critical governance checks should be
from five different perspectives: physical, logical,
undertaken by information security teams.
network, application and information security.
6 ISACA JOURNAL VOLUME 2 | 2022 © 2022 ISACA. All rights reserved. www.isaca.org