Introduction
- Effective security measures require physical security controls. While electronic controls alone are important, they may become useless if the device is physically accessed or removed by an unauthorized party.
- This document defines standards for the physical security of UBC Datacentres. These Datacentres are intended to provide a secure location for operations, controlled access to equipment and data, protection against environmental threats, and support for the availability requirements of UBC Electronic Information and Systems. University IT Support Staff are responsible for ensuring that the requirements of this document are complied with.
- The University has a responsibility to protect High and Very High Risk Information from unauthorized viewing and use. In particular, the Freedom of Information and Protection of Privacy Act (FIPPA)1 and Policy 117, Records Management2 require public bodies to implement reasonable and appropriate security arrangements for the protection of Personal Information (in both electronic and paper format). Therefore, servers containing significant quantities of High or Very High Risk Information must be hosted in UBC Datacentres or in third- party servers that have an equivalent level of security to this standard. Where appropriate, Low and Medium Risk Information may also be hosted in UBC Datacentres.
- The Chief Information Officer has issued this document under the authority of Policy 104, Acceptable Use and Security of UBC Electronic Information and Systems. Questions about this standard may be referred to information.security@ubc.ca.
Physical Security Controls
- The table below outlines the minimum set of physical security controls required for UBC Datacentres, based upon the Security Classification of UBC Electronic Information standard.
Control Area | Information Security Classification | |||
---|---|---|---|---|
Very High Risk | High Risk | Medium Risk | Low Risk | |
Rooms | Datacentre must be located in a fully enclosed room. Walls must meet the following criteria:
|
Equipment can be located in open areas if other protective measures are in place, e.g. locked cages. | ||
Doors and Locks |
|
Datacentre doors must be locked when room is not in use. Either electronic or mechanical locks are acceptable. |
||
Glazing | All exterior glass in doors and accessible windows must be reinforced. Consider installing high-grade security film (minimum standard should be Profilon AXA1-15Mil or equivalent) to resist forced entry. | Windows must be able to securely lock from the inside. | ||
Visibility of Equipment | Window coverings (blinds/shades) or reflective/tinted film should be installed on glazed windows or doors in order to reduce direct sightlines to valuables inside the facility. | |||
Cabling | Power and network cabling carrying data or supporting information services should be protected from interception or damage outside of the Datacentre. | |||
Managing Access |
|
|||
Alarms and Remote Monitoring | Alarms (monitored 24/7) must be installed that trigger on unauthorized access. | Good practice is to install and monitor an alarm system to detect intruders. | ||
CCTV has been debated as an effective deterrent to crime, but if employed with adequate resolution and proper camera placement, its forensic effectiveness is undisputed. All CCTV installations must be approved by the Access and Privacy Manager. | ||||
Power Supply |
|
N/A | ||
Environmental Controls |
|
Comply with Building Code requirements. | ||
Fire Protection | Fire detection and suppression devices, such as fire extinguishers and pre-action or dry pipe sprinkler systems, must be in place. | Comply with Building Code requirements. | ||
Data Backups | If information is backed up onto electronic media, the same physical security requirements are to be applied to that media unless the information is encrypted (see the Encryption Requirements standard). |
2 Policy 117, section 2.4