Upload
jeffrey-lam
View
69
Download
2
Embed Size (px)
Citation preview
There are nosecure systems!You can only make systems more secure.
SECURING OUR DATACENTERSSecurity is not a product nor a feature; it’s an integration of culture, policies & systems
Defence in Depth
MoatOuter Wall
Inner WallKeep / Tower
PerimeterBuilding
Critical SpacesStrongbox
Castle Datacenter
1. ARCHITECTURAL DEFENCEBARRIERSPerimeter fencingBuilding WallsComputer / plant roomsIT / control cabinet
ACCESSPerimeter GatesBuilding entrancesComputer room entrancesCabinet doors
CONNECTORSFacility groundsMantrapsElevatorsCorridors
LAYE
RS
PUBLIC ADDRESS
VOICE COMMS
OTHERS
INTRUDER DETECTION
SOFTWAREANALYTICS
VIDEO SURVEILIANCE
ACCESS CONTROL
2. TECHNICAL DEFENCE
PERIMETER - THERMAL CAMERAS
Detect with thermal camera(AXIS Q1922) Visual camera
(AXIS Q1755)Zoom & identify with visual
camera (AXIS Q1755)
Security-based operations
PERIMETER – LARGE OPEN SPACES
AXIS Q60-E showing the zoomed-in view of interest.
BUILDING LEVEL – VARYING LIGHT LEVELS
Underexposedtrying to capture the environment outside
Overexposedtrying to capture the environment indoors
WDR Forsensic CaptureLooks slightly unreal, but
more useful for surveillance
Security-based operations
!
Post-event images
Security-based operationsPre-event images
Computer Room : integrated with IIM/DCIM
Security-based operationsEvent
> Small form factor> Installed at eye level – capture face> Integrated with audio & I/O > Integrated with DCIM / IIM > Single IP address for multiple cameras
STRONGBOX (RACK) LEVEL CAMERAS
INTRUSION DETECTION
Buried coilElectromagnetic
Infra-redOpen Area Sensor
PressureWall & floor sensors
Camera Analytics
Analytics
Audio Analytics
Video Analytics • Gunshot• Broken glass• Explosion • Screeching car• Voice – aggression• Voice – key words
• Perimeter protection• Facial recognition• People counting• Unauthorized access• Aggression detection• Smoke detection
IP PUBLIC ADDRESS SYSTEMAxis network speaker solutionTraditional analog speaker solution
Speaker
Amplifier
Tone control / Equalizer
Streaming box
All-in-one
Network switch Network PoE switch
- Speaker audio cable
- Line level audio cable
- Line level audio cable
- Network cable
- Network cable(Structured Cabling)
> Identification & verification– What you Have– What you Know– Who your Are
> 2 factor / 3 factor authentication> Turnstiles integration for Anti-passback & anti tailgate> System Management
– Token – lost / disabled– Passcode renewal / forgotten– Maintenance of biometrics database
ACCESS CONTROL
Other electronics systems• Key Management Systems• RFID Asset management systems• Visitors pass management systems• Mantrap with weighing scale /metal detector• Vehicle entry with weighing scale• Drone detection & disablement systems• Drone based surveillance system• Intruder response system – fog, net, etc• Etc.
COPYRIGHT TRAKKER
IoT – CENTRALISED CONTROL
Security-based operations
CAMERAS
PIR SENSORS
ILLUMINATOR
I/O CONTROLLERDOOR
CONTROLLER
SPEAKERS
MICROPHONE
INTERCOM
Standard hardening stops majority of attacks
Intuitive and user-friendly IT policies
System maintenance process
User education –Embrace security culture
How about Cybersecurity?
The goal is to make attacks expensive rather than impossible.
Security-based operations
Security Culture
3. OPERATIONAL DEFENCE• Security Awareness• Training, Tabletops & Drills• Audits, feedback &
Modifications• Event post-mortem &
Corrective actions
• Use of disabled cards• Perimeter breach• Left baggage• Tailgating• Unplanned deliveries• Unaccounted visitors
• Assets disposal• Visitor / vendors access• Maintenance / repair work• Employees backgd checks• Purch. & delivery new equip.• Emgy access by authorities / utilities
Event Response
Security - based operations