CPP121f CPIT ICT Security Physical and Environmental Security Standard v2 3
CPP121f CPIT ICT Security Physical and Environmental Security Standard v2 3
Christchurch Polytechnic
Institute of Technology
Physical and Environmental
Security Standard
Corporate Policies & Procedures
Section 1: General Administration Document CPP121f
Information Communication
Technology Division
Principles
Security Policy
Security Standards
Guidelines and Procedures
Contents
INTRODUCTION ............................................................................................... 4
Page 2 of 8
Authorised By:
ICT Director
Document
Owner
Technology Manager
Date of Issue:
15 March 2012
Review date:
November 2014
Version:
2.3
References:
This document should be read in conjunction with the ICT Security Policy.
In addition it should be read in conjunction with the following ICT Security
Standards:
1.
2.
3.
4.
5.
Page 3 of 8
INTRODUCTION
Physical and Environmental Security refers to the protection of ICT Secure Facilities and equipment
from theft, natural disaster, accidental damage and environmental changes like power or cooling.
ICT Secure Facilities typically house computer equipment and communication equipment that are
critical for delivering the ICT service; it is therefore important that these facilities have reliable power
supply, appropriate climate control and preventative monitoring in place.
Access to ICT Secure Facilities needs to be restricted and monitored to ensure that only authorised
personnel access the facilities. Finally, ICT staff should follow best practices to monitor and maintain
the ICT services within an ICT facility.
These Security Standards recommend the security measures that the Institution need to consider to
protect the physical ICT Secure Facilities and maintain the environmental conditions to support an
ICT operation.
The following topics are covered:
Physical Access
Environmental
Standards
Page 4 of 8
The purpose of this section is to ensure that CPIT ICT Secure Facilities are appropriately protected
and secured through access control.
2.1
Physical access to ICT Secure Facilities should be restricted to authorised individuals, backed with
suitable mechanisms to record and monitor visitors to the facility.
Access to ICT Secure Facilities should include the following controls:
Access to ICT Secure Facilities should be granted only to those ICT staff or contractors whose job
responsibilities require access to the facility.
2.2
Why worry?
It is important to safeguard ICT Secure
Facilities and ensure you know who has
access to these facilities. It can be too
easy sometimes to walk into a secure ICT
facility without being challenged. The
standards recommend the following:
All access must be authorised by the Infrastructure Manager or ICT Director and allocated
appropriate 'visitor' identification.
Visitors are only permitted access for defined and authorised purposes.
Visitors must be appropriately supervised at all times as defined by the Infrastructure Manager
or ICT Director.
Visitors must comply with the Institutions Health and Safety Policy CPP501.
2.3
ICT Secure Facilities need to be constructed and monitored to maintain a high level of security. A
secure ICT facility typically contains CPIT sensitive information, financial information and user data
or provides services essential to the operations of the Institution. Hence, these facilities must be
protected well and have appropriate security standards followed.
The following measures need to be considered as best practice to protect all current and future ICT
facilities at CPIT. These best practices also apply to any other location that is used to host CPITs
ICT equipment:
Page 5 of 8
ICT Secure Facilities are to be located away from public thoroughfares when practicable.
Location signs are to be kept to a minimum.
A fire-proof safe should be available to locate sensitive information and backup media. This may
be off-site.
Page 6 of 8
ICT Secure Facilities and equipment should be protected against environmental changes in power,
cooling or flooding. Without the right level of protection, ICT services are at risk and the likelihood
of a service being unavailable, following a change in the environmental conditions, increases.
Once an appropriate level of power and cooling protection has been established these systems
require regular review to ensure they function as expected and they meet the needs of CPIT.
3.1
Power Supply
The objective is to establish a reliable power supply for computer installations to prevent disruption
to services.
Measures to consider include:
Segregating power cables away from communications cables to limit the potential of
interference.
Locate power cables away from foot traffic to minimise ICT staff tripping or knocking power
cables out of ICT equipment.
Scaled to provide sufficient power to the ICT Secure Facilities for an agreed period of time
required to support the SLAs and deliver the services as determined by the Institution.
Monitored to inform ICT staff when UPS power has been engaged.
Providing ICT support staff, including security staff, with UPS equipment supporting local desktop
computers and associated communications infrastructure; this is to allow support/security staff
access to servers when the power is out.
3.2
ICT Secure Facilities and equipment should be protected against fire, flooding, heat, earthquake and
other natural disasters. This is to reduce the risk of ICT services being disrupted and the potential
loss of data.
Measures to consider include:
Locate ICT Secure Facilities in a safe environment with a low risk of fire, flood, explosion or
damage from neighbouring activities.
Ensuring ICT Secure Facilities do not contain intrinsic fire hazards such as paper or chemicals.
Installation of water monitors to detect the presence of water within the server room; these are
to be suitably alarmed.
Page 7 of 8
Locating servers and associated equipment above ground level to minimise risk from flooding.
Installation of devices and physical infrastructure to control the temperature and humidity of
server rooms in accordance with the equipment manufacturers recommended levels.
Page 8 of 8