Physical Security of UBC Datacentres
- Effective security measures require physical security controls. While electronic controls alone are important, they may become useless if the device is physically accessed or removed by an unauthorized party.
- This document defines standards for the physical security of UBC Datacentres. These datacentres are intended to provide a secure location for operations, controlled access to equipment and data, protection against environmental threats and support for the availability requirements of UBC Electronic Information and Systems. University IT Support Staff are responsible for ensuring that the requirements of this document are complied with.
- The University has a responsibility to protect High and Very High Risk Information from unauthorized viewing and use. In particular, the BC Freedom of Information and Protection of Privacy Act (FIPPA) and Policy GA4, Records Management require public bodies to implement reasonable and appropriate security arrangements for the protection of Personal Information (in both electronic and paper format). Therefore, servers containing significant quantities of High or Very High Risk Information must be hosted in UBC Datacentres or in third party servers that have an equivalent level of security to this standard. Where appropriate, Low and Medium Risk Information may also be hosted in UBC Datacentres.
- The Chief Information Officer has issued this standard under the authority of Policy SC14, Acceptable Use and Security of UBC Electronic Information and Systems. Questions about this standard may be referred to firstname.lastname@example.org.
Physical Security Controls
- The table below outlines the minimum set of physical security controls required for UBC Datacentres, based upon the Security Classification of UBC Electronic Information standard.
Control Area Information Security Classification Very High Risk High Risk Medium Risk Low Risk Rooms Datacentre must be located in a fully enclosed room. Walls must meet the following criteria:
- Must extend from floor to ceiling slab.
- Should preferably be constructed from a solid, resistant material such as concrete or brick. If they are not solid (e.g. drywall), then they must be reinforced with wire mesh.
Equipment can be located in open areas if other protective measures are in place, e.g. locked cages. Doors and Locks
- Datacentre doors must be locked when room is not in use.
- Good practice is to install automatic closing mechanisms.
- Security grade door fastening hardware must be used in conjunction with a metal door and frame.
- Acceptable locking mechanisms include electronic proximity access cards/fobs, keypad type entry locks, and biometric locks.
Datacentre doors must be locked when room is not in use. Either electronic or mechanical locks are acceptable. Glazing All exterior glass in doors and accessible windows must be reinforced. Consider installing high-grade security film (minimum standard should be Profilon AXA1-15Mil or equivalent) to resist forced entry. Windows must be able to securely lock from the inside. Visibility of Equipment Window coverings (blinds/shades) or reflective/tinted film should be installed on glazed windows or doors in order to reduce direct sightlines to valuables inside the facility. Cabling Power and network cabling carrying data or supporting information services should be protected from interception or damage outside of the datacentre. Managing Access
- The public must not have direct access to the datacentre perimeter. An outer security perimeter should be established with access controls sufficient to prevent direct public access.
- Use signage to clearly delineate publicly accessible space from Authorized Personnel-Only areas. Signage should not indicate the presence of UBC Electronic Systems.
- Individual(s) must be assigned the authority to grant access to the datacentre and someone must be appointed to formally manage the physical access process including revocation of access (fob/card, keypad access).
- Individuals who are not authorized to access the datacentre must be escorted at all times by an authorized individual.
- Access must be logged electronically or in a logbook in the case of keypad entry doors that do not uniquely identify an individual.
Alarms and Remote Monitoring Alarms (monitored 24/7) must be installed that trigger on unauthorized access. Good practice is to install and monitor an alarm system to detect intruders. CCTV has been debated as an effective deterrent to crime, but if employed with adequate resolution and proper camera placement, its forensic effectiveness is undisputed. All CCTV installations must be approved by the Access and Privacy Manager. Power Supply
- Redundant power should be supplied to the datacentre where possible.
- Servers should all be connected through a UPS in order to remain running in the event of short power outages.
n/a Environmental Controls
- Sufficient Heating, Ventilation and Air Conditioning (HVAC) systems must be in place to effectively maintain all UBC Electronic systems within the manufacturers' required temperature and humidity operating ranges.
- Measures must be in place to monitor and detect variation in temperature and humidity.
- Where possible, water and drainage plumbing should not run across the ceiling of a datacentre.
- The floor of the datacentre should be raised above the subfloor to reduce the risk of flood damage.
Comply with Building Code requirements. Fire Protection Fire detection and suppression devices, such as fire extinguishers and pre-action or dry pipe sprinkler systems, must be in place. Comply with Building Code requirements. Data Backups If information is backed up onto electronic media, the same physical security requirements are to be applied to that media unless the information is encrypted (see the Encryption Requirements standard).
Related Documents and Resources
- BC Freedom of Information and Protection of Privacy Act (FIPPA)
- Policy GA4, Records Management
- Policy SC14, Acceptable Use and Security of UBC Electronic Information and Systems
- Security Classification of UBC Electronic Information standard
- Encryption Requirements standard
Last Revised: 2021-01