Wednesday, November 18, 2020

What to consider in Data Centre Security

Data Centre Security Requirements

A Data Centre environment is very complex and critical in nature. This is the core infrastructure or spine of any internet world. Without data centre and high end systems no network and no internet can be thought. So considering the critically there must be a security concern to keep safe of all data and information. There are various parameters need to be considered for security perspective such as network security, Antivirus, Server security, Authentication, Data security, Firewall services, IDS and IPS, Incident Response, etc.

Here I am giving some basic parameters for some devices mentioned above briefly.

Antivirus Security

  • An antivirus should be a host based and web based. Means we can use or install antivirus agent at all my host systems including servers and systems inside the Data centre and can be monitored centralized, can be updated from web time to time. 
  • The antivirus must have all inbound and outbound monitoring of all data transfer mechanism including email scans.
  • It should have both offline and online scanning features.
  • It should manage its own patch in timely means timely update to virus engine and signature files.
  • It should allow rule based detection for unknown viruses.
  • It should support and ensure safe payment, tracker proof.

Host Server Security

  • It should have strong access control lists, so that it can restrict unauthorized access. 
  • Server must be able to prevent hackers with root access from shutting down the system remotely.
  • Disable unnecessary protocols and ports.
  • Disable default user accounts
  • The server should have super admin user right.
  • Server side Encryption should be there.

Network Security

  • There should be login banner during the login time with notes and important precaution messages. 
  • It should restrict unauthorized traffic by implementing network traffic filters, firewall and access control list.
  • There should be controls to ensure integrity and confidentiality of the domains and data.
  • There should be network based intrusion detection tools.
  • Virtual Private network must be used for each working employee at onsite and remote site supporting staff.
  • There should be strong Secure Socket Layer (SSL) and strong encryption techniques for network access through public access.
  • There should be real time monitoring of all systems and network devices/ systems to detect potential security violations. 
  • Monitor all logs of devices as well as retain the logs for future forensic investigation. All the log information should be kept secure and confidential.
  • Host based Intrusion Prevention System (IPS) should be there to discover attacks, protect operating systems and applications and trigger alarm in case of any exploitation occurs in the network. 

Identity, Authorization

  • All the users should be identified and authorized by the system.
  • A access control list must be there and need to be reviewed in time to time.
  • There should be effective password management.
  • For the web based applications the cookies should be encrypted so that no middle man can compromise with cookies. 
  • Policy information should be stored directly in LDAP.  

The above parameters are just for understanding some basic security points whereas it may not cover all the expected requirements as security is very depth in nature, so depending on the network and application the security layer can be designed for a Data Centre. Many security device details are covered in this blog. Please refer them to know more about them.

If you have any suggestions, please provide in comments below. Do follow and share if you like the contents. 

-DR


No comments:

Post a Comment

Network Scanning Tools

Network Scanning through Nmap and Nessus Network scanning is a process used to troubleshoot active devices on a network for vulnerabilities....