Page 686 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 686

locating these rooms on the ground floor, on the top floor, and in the
               basement whenever possible. Additionally, the server room should be

               located away from water, gas, and sewage lines. These pose too large a
               risk of leakage or flooding, which can cause serious damage and
               downtime.




                          The walls of your server room should also have a one-hour

                  minimum fire rating.










                   Making Servers Inaccessible


                  The running joke in the IT security realm is that the most secure
                  computer is one that is disconnected from the network and sealed
                  in a room with no doors or windows. No, seriously, that’s the joke.

                  But there’s a massive grain of truth and irony in it as well.

                  Carlos operates security processes and platforms for a financial
                  banking firm, and he knows all about one-way systems and
                  unreachable devices. Sensitive business transactions occur in
                  fractions of a second, and one wrong move could pose serious risks
                  to data and involved parties.

                  In his experience, Carlos knows that the least accessible and least
                  human-friendly places are his most valuable assets, so he stores

                  many of his machines inside a separate bank vault. You’d have to
                  be a talented burglar, a skilled safecracker, and a determined
                  computer attacker to breach his security defenses.

                  Not all business applications and processes warrant this extreme
                  sort of prevention. What security recommendations might you
                  suggest to make a server more inconvenient or inaccessible, short
                  of dedicating a vault? An interior room with limited access, no

                  windows, and only one entry/exit point makes an excellent
                  substitute when an empty vault isn’t available. The key is to select a
   681   682   683   684   685   686   687   688   689   690   691