Who is accessing company’s most sensitive data? Where? When? And if someone without authorization did, how would one know?
Some of the world’s best-known companies have succumbed to data breaches that proved expensive—in terms of both cost and reputation. The focus, usually, is on a digital attack. Passwords and anti-hacking procedures come under scrutiny, particularly in a world where so much of information lives in the cloud.
But there is another way that company data can fall into unauthorized hands: someone could walk right up to the server and access it physically, with equally disruptive results.
Shared Data Centers May Increase Risk For Data Security
The risks increase when companies use shared data centers — or “colocation” — which has become an increasingly popular option. According to 451 Research KnowledgeBase, the global colocation market could grow from $23 billion in 2014 to $37 billion by 2017. All the “big data” has to go somewhere, and shared data centers provide a cost-effective solution, even for information of the most sensitive kind.
Data centers have stringent security procedures, of course. But is it wise to fully entrust the valuable data, sensitive customer information, to a third party? Can one be certain that a third party’s security procedures meet the legal compliance commitments, to the European Data Protection Directive, the Sarbanes–Oxley Act, the PCI Data Security Standard and other personal and commercial data protection regulations?
And do the company even know who they share server space with? It could be a direct competitor.
Data Center Security Management - A Must For Any Company’s Agenda
Disruption of physical security and potential breach as a result may not even be deliberate or malicious. Server rooms have a steady flow of authorized traffic: cleaners, maintenance staff, repair technicians and more. Unfortunately, accidents happen.
For these reasons, data center security management needs to be high on any company’s agenda. As high as cyber-security. In an interview with datacenterknowledge.com, Jason Cook, CTO of BT Americas, suggested: “Physical security is still one of the easiest ways to get access to data. With all of the sophistication in current technology, what’s the point, if someone can walk in and open the door?”
IBM estimates the average cost of a single data breach at $3.79 million. Fortunately, technologies that can help secure servers—even in colocation data centers—cost a lot less than that.
A Mechanical-Key Audit Trail Not Enough For Investigation In Event Of Breach
A high-security mechanical lock might seem like a solution. But a mechanical system can be expensive to run, due to the costs of secure key management and replacement when keys go missing. Once issued, there’s no way to change a physical key’s user rights. A mechanical-key audit trail — who had access to your servers, when, for how long — will probably not be enough to conduct a proper investigation in the event of any type of breach. Even high-security perimeter doors and CCTV-powered server room security will not suffice, if the server rack has an old-fashioned mechanical lock.
Server cabinet locks are the last line of defense against a physical breach, yet mechanical keys are still a common sight in data centers. This is becoming increasingly unsatisfactory, especially when that server could hold the key to the business success.
ASSA ABLOY Aperio® KS100 Server Cabinet Lock With Real-Time Access Control Capabilities
One solution is ASSA ABLOY’s Aperio® KS100 Server Cabinet Lock. The KS100 adds real-time access control capabilities to a server cabinet, drawer or rack. It brings server racks into an existing third-party access control system, without breaking the bank. KS100 electronic locks work with smartcards using all standard RFID technologies, including iCLASS® from HID, Seos™, MIFARE® and DESFire.
Installation is quick and easy, with power coming via a Power over Ethernet (PoE) connection. Once installed, KS100 locks integrate with your access control system and communicate wirelessly through an Aperio® Communication Hub. With online integration, when any of your smart credentials is presented to the lock, access decisions are communicated from and recorded by the system wirelessly.
With Aperio®, lost cabinet keys no longer compromise server security: smart credentials are simply de-authorized and a valid replacement can be quickly re-issued. The current status of any lock can be revealed with the click of a mouse. Generating detailed audit trails is straightforward, making the KS100 invaluable for incident investigation. With Aperio® server cabinet locks, businesses have the freedom to manage access to their own equipment and data, even in colocation data centers.
Do one know exactly who last had access to the servers, and when? Install Aperio®, and next time the data manager asks, the answer is yes.
- The data center colocation market could be worth $37 billion by 2017
- Companies have a legal requirement to protect sensitive customer data, under the European Data Protection Directive and other regulations
- Investigating any breach properly requires detailed audit trails, which mechanical keys cannot provide
- An Aperio® KS100 Server Cabinet Lock can integrate with an installed access control system, boosting security wirelessly and adding full audit trail capabilities to server space, even in shared data centers