🏢A Comprehensive Guide to Data Centre General Systems | Best Practices & Justifications👷


Data centres are critical hubs of modern infrastructure, housing essential computing, storage, and networking resources. Ensuring their operational efficiency, resilience, and security requires meticulous planning and attention to detail. This guide elaborates on a robust checklist focusing on site selection, security, and operational considerations, excluding power, cooling, and white space systems. By detailing the justifications and benefits of each check, it provides actionable insights for building and maintaining world-class data centre facilities.
1. Site Selection
Overview: Selecting an appropriate site for a data centre mitigates risks associated with environmental hazards, enhances accessibility, and ensures long-term operational security.
Key Considerations:
Flood Hazard Mapping:
Justification: Data centres must be safeguarded against flooding, which can lead to catastrophic failures and downtime.
Requirement: Ensure the site is outside the 100-year flood hazard zone as determined by the local regulatory body.
Benefit: Minimises risks from natural disasters, ensuring uninterrupted operations.
Proximity to Waterways:
Justification: Sites near coastal or inland waterways are more susceptible to flooding and erosion.
Benefit: Reduces potential water damage risks and lowers insurance costs.
Traffic and Noise Impact:
Justification: Traffic and vibration from nearby major roads can compromise structural integrity and disrupt sensitive equipment.
Requirements: Maintain specific distances:
Tier 3: 91 metres from major traffic arteries.
Tier 4: 0.8 km from major traffic arteries.
Benefit: Ensures a stable operating environment.
Airport Proximity:
Justification: Airports can introduce vibration and noise, while also posing security risks.
Requirements:
Tier 3: At least 1.6 km away.
Tier 4: At least 8 km away.
Benefit: Ensures equipment longevity and enhanced physical security.
Access to Major Metropolitan Areas:
Justification: Proximity to urban centres ensures faster service delivery and support.
Requirements:
Tier 3: Not more than 48 km.
Tier 4: Not more than 16 km.
Benefit: Balances accessibility with environmental and security concerns.
2. Parking Facilities
Overview: Parking areas must be designed to ensure security and prevent unauthorised access to sensitive areas.
Key Considerations:
Separation Between Visitor and Employee Parking:
Justification: Prevents unauthorised access to employee areas.
Requirement: Physical separation (e.g., fences or walls) is mandatory for Tier 3 and Tier 4 facilities.
Benefit: Enhances security and minimises the risk of breaches.
Distance from Loading Docks:
Justification: Ensures separation of operational and visitor activities, reducing risks of unauthorised access.
Requirements:
Tier 3: At least 9.1 metres.
Tier 4: At least 18.3 metres.
Benefit: Prevents potential security threats and contamination.
Multi-Tenant Occupancy:
Requirement: Permissible only if all tenants are data centre or telecom companies.
Justification: Ensures alignment in security protocols and operational requirements.
3. Entry Lobby
Overview: A secure and segregated entry lobby acts as the first line of defence against unauthorised access.
Key Considerations:
Dedicated Entry Lobby:
Justification: Separation from other areas prevents unauthorised access and fire hazards.
Requirement: Physically separate and fire-protected.
Benefit: Reduces security risks and enhances fire safety.
Security Counter:
Justification: Monitored access ensures only authorised individuals can enter.
Requirement: Staffed security counter.
Benefit: Provides real-time oversight of access points.
Single-Person Interlock:
Justification: Prevents piggybacking and pass-back incidents.
Benefit: Strengthens access control measures.
4. Security Features
Overview: Physical and operational security measures protect sensitive data and systems against threats.
Key Considerations:
Security Office Design:
Justification: Resilient office structures enhance the protection of security personnel and equipment.
Requirement: Intrusion-resistant doors, bullet-resistant glass, and dedicated monitoring rooms.
Video Surveillance:
Justification: Comprehensive monitoring reduces blind spots and aids in incident investigations.
Requirement: Overlapping camera angles and functional recording systems.
Monitored Areas: Generators, UPS rooms, fibre vaults, and emergency exits.
Benefit: Strengthens situational awareness and forensic capabilities.
Access Control:
Dual-Factor Authentication:
Justification: Adds an extra layer of security against unauthorised access.
Factors: Retinal scan, card, biometric, PIN, RFID.
Anti-Passback Systems:
- Justification: Prevents tailgating and unauthorised re-entry.
5. Operations & Administrative Areas
Overview: Segregation of sensitive areas ensures operational integrity and reduces risks of interference.
Key Considerations:
Administrative Offices:
Justification: Separation prevents disruptions and protects sensitive systems.
Requirement: Fire-separated and isolated from computer rooms.
Operations Centre:
- Justification: A secure, dedicated space ensures uninterrupted monitoring and management.
Restrooms and Break Rooms:
Justification: Leak-prevention barriers protect sensitive areas from water damage.
Requirement: 50 mm raised concrete flooring.
6. Shipping & Receiving Areas
Overview: Securing loading bays prevents contamination and unauthorised access to sensitive zones.
Key Considerations:
Physical Separation:
Justification: Fire barriers reduce risks from external hazards.
Requirement: Plywood protection for Tier 3, steel bollards for Tier 4.
Interlocked Doors:
- Justification: Prevents unauthorised access during loading/unloading activities.
7. Communications Infrastructure
Overview: Reliable communication pathways are vital for continuous operations.
Key Considerations:
Redundant Telecom Providers:
Justification: Ensures uninterrupted connectivity in case of provider failure.
Requirement: Diverse routing from entry points to computer rooms.
Meet-Me Rooms:
- Justification: Physically separated entry points enhance redundancy.
Data Communication Metrics:
- Requirement: Measure and maintain bandwidth reliability, ensuring operational backups.
8. Emergency Preparedness and Incident Management
Overview: Preparedness ensures swift recovery and minimised downtime during incidents.
Key Considerations:
Intrusion Detection:
- Justification: Continuous monitoring detects and responds to breaches promptly.
Breach Management Protocols:
- Requirement: Implement standard forms and procedures for incidents.
Key Management:
- Justification: Prevents unauthorised duplication and access.
9. Implementing the Security Planning Framework (DDDRRR) in a Data Centre
The Security Planning Framework (DDDRRR) provides a comprehensive approach to securing data centres by addressing six critical elements: Deterrence, Detection, Delay, Response, Recovery, and Re-evaluation. Here's a detailed breakdown of how to implement each step effectively:
Deterrence | Discouraging Breaches Through Policies and Measures
Deterrence involves proactive strategies to make potential breaches unlikely by dissuading malicious actors. It combines physical, procedural, and technological approaches.
Implementation Strategies:
Robust Physical Presence:
Signage: Use prominent signage warning of 24/7 surveillance, restricted access, and legal consequences for trespassers.
Visible Security Measures: Install visible fencing, security cameras, and motion-activated lighting around the perimeter.
Access Control Policies:
Implement tiered access levels based on roles and responsibilities.
Enforce stringent ID badge issuance with photo verification.
Require non-disclosure agreements for all personnel accessing the site.
Vendor and Visitor Controls:
Mandate prior approvals for vendor visits.
Require visitors to log entries, provide identification, and use temporary access badges.
Cybersecurity Awareness:
Train staff on phishing threats and insider breach risks.
Use policy enforcement software to ensure employees adhere to access guidelines.
Benefits:
Deterrence measures create a perception of heightened vigilance, discouraging breaches before they are attempted.
Detection | Continuous Monitoring & Alarms
Detection focuses on identifying threats as they occur to enable a swift response.
Implementation Strategies:
Video Surveillance:
Use high-definition cameras with overlapping fields of view, especially in critical areas like server rooms, meet-me rooms, and emergency exits.
Integrate AI-driven analytics to identify unusual behaviours (e.g., loitering or unauthorised access attempts).
Alarm Systems:
Deploy intrusion detection systems (IDS) for windows, doors, and sensitive zones.
Integrate alarms with central monitoring systems to trigger alerts automatically.
Environmental Monitoring:
- Implement sensors for temperature, humidity, and water leaks to detect environmental anomalies.
Access Logs:
Record and review all access logs from card readers, biometric scanners, and other entry systems.
Monitor for unusual access patterns, such as after-hours activity.
Benefits:
Detection systems ensure real-time awareness of potential intrusions, enabling immediate intervention to mitigate risks.
Delay | Physical Barriers to Slow Intrusions
Delay involves creating layers of physical security to slow down intrusions, providing time for response teams to act.
Implementation Strategies:
Perimeter Security:
Use crash-rated fences and vehicle barriers to prevent unauthorised vehicular access.
Install anti-climb walls or fences topped with barbed wire.
Entry Points:
Use reinforced doors with electromagnetic locks.
Deploy mantraps or interlocked doors to control access one person at a time.
Server Room Protections:
Use cage enclosures for server racks with individual locking mechanisms.
Reinforce walls and floors with materials resistant to drilling or penetration.
Safeguarding Communication Lines:
Protect fibre and telecom cables with hardened conduits.
Monitor cable vaults and entry points with surveillance and alarms.
Benefits:
Physical barriers slow intrusions, providing valuable time for security teams to respond effectively.
Response | Action Plans for Quick Mitigation
Response involves having predefined plans and protocols to address threats immediately after detection.
Implementation Strategies:
Incident Response Teams:
Establish a dedicated security operations centre (SOC) team to monitor and respond to incidents 24/7.
Train staff on emergency protocols, including evacuation, lockdown, and containment procedures.
Incident Management System:
Deploy tools to manage and track security incidents, enabling documentation and escalation as needed.
Use automated workflows to notify relevant stakeholders (e.g., law enforcement, executives) based on incident severity.
Testing and Drills:
Conduct regular drills for fire, breach, and power outage scenarios.
Test alarm and access control systems periodically to ensure functionality.
Benefits:
Well-defined response plans minimise downtime and damage by ensuring prompt and coordinated actions during a breach.
Recovery | Procedures to Restore Normal Operations
Recovery focuses on returning the data centre to full operational capacity following a security event.
Implementation Strategies:
Data Backups:
Ensure regular off-site and cloud backups of critical data to prevent loss during a breach.
Test restoration processes periodically to verify backup integrity.
Business Continuity Plan (BCP):
Develop a BCP outlining recovery steps, communication protocols, and fallback options during outages.
Maintain redundant systems and failover mechanisms to minimise downtime.
Forensic Analysis:
Investigate security incidents to determine the root cause and prevent recurrence.
Document findings in detailed post-incident reports.
Benefits:
Effective recovery procedures minimise the impact of security breaches, ensuring quick resumption of services.
Re-evaluation: Regular Updates to Security Protocols
Re-evaluation ensures that security measures evolve to address emerging threats and vulnerabilities.
Implementation Strategies:
Periodic Risk Assessments:
Conduct bi-annual or annual audits of physical and digital security systems.
Evaluate the effectiveness of deterrence, detection, and delay measures.
Threat Intelligence:
Subscribe to threat intelligence feeds to stay informed about new vulnerabilities and attack vectors.
Adapt security protocols to counteract identified risks.
Feedback Loop:
Gather feedback from staff and security teams on existing policies and technologies.
Incorporate lessons learned from incident responses into updated protocols.
Technology Refresh:
Replace outdated security equipment (e.g., cameras, access control systems) with advanced solutions.
Regularly update software and firmware to patch vulnerabilities.
Benefits:
Re-evaluation ensures the data centre remains resilient against evolving threats, maintaining long-term operational integrity.
Wrap
Adhering to this detailed checklist ensures that data centres achieve operational excellence while minimising risks. By following best practices and tailoring them to specific needs, organisations can enhance resilience, security, and efficiency. Regular evaluations and adherence to the DDDRRR framework provide a structured approach to maintaining robust and future-proof data centre operations.
Additional reading:
Subscribe to my newsletter
Read articles from Ronald Bartels directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

Ronald Bartels
Ronald Bartels
Driving SD-WAN Adoption in South Africa