Members Content: Articles

Your Physical Security Checklist

Wednesday, January 20, 2021  
Physical security at a data center encompasses more than biometrics, and controlling physical access is the first level of defense.  A byproduct of a good physical security strategy includes regularly patrolling/monitoring areas of ingress and egress and securing sensitive areas.  Not only does this help thwart breaches, but it also enhances life safety, equipment safety and general health of a facility.  This tool, courtesy of DCI Board Member Carrie Goetz, is a combined approach that addresses people, fire, safety, and procedure. See if you can check all the items off your security list.

Physical Risks in the Area

 Is this area free from cardboard and other flammables?
 Is there fire suppression in this area?
 When was the last time the fire suppression was checked by a fire inspector?
 Is there an emergency contact list clearly visible to security personnel?
 Is there an emergency exit lighted sign?
 When was the last time the sign was checked for operational integrity?
 Is the area free from trip hazards?
 Are all exits clearly marked?
 Is there an emergency power off button (if so required)?
 Do all exits have an exit map clearly placed at eye level?
 Are the aisles free of obstructions?
 Are the loading docks physically separate from the main data hall?
 Are all floor tiles in place?
 Is there a lockout tagout plan when floor tiles are removed?
 Are all ceiling tiles in place?
 Is there evidence of water leakage?

Overall Procedure

 Is there a formal physical security training program in place?
 How often is the program refreshed?
 Are visitors required to pass basic safety training prior to entrance?
 Are vendors required to pass basic safety training prior to entrance?
 How often are security personnel required to update/validate their training?
 If the center has hazardous chemical suppression, is training in place if it is discharged?
 Are access control systems set to fail open in the event of fire?
 Are the access control systems tested for fail open events?
 Do security personnel have access to an emergency contact list?
 Are security incidences logged in a main security log?
 Are procedures in place to educate after a breach?
 Are main fire suppression tanks checked daily (if in place)?
 Are main fire suppression tanks regularly inspected by fire personnel?
 Are security officers trained on fire extinguisher use?
 Are fire extinguishers inspected/replaced as required?
 Is there a log of fire suppression inspections?
 Is that log monitored?
 Is there a clear procedure to patrol the facility?
 Are patrols on a random time periods?