You are on page 1of 3

INNER LAYERS OF FACILITY PROTECTION

Although the concept of physical security layering clearly makes unauthorized entrance from

outside a data center building more difficult, inner layers also help prevent insider risks,

which are sometimes overlooked. They are, for the most part, physical barriers that leads up

to the building’s walls. We also mentioned that, depending on the outer perimeter’s

surroundings, you, as the CSM, might start security at the building walls. The first level of

security in this case is made up of a building’s doors, walls, and windows. This issue is

exemplified by office buildings in metropolitan surroundings. Conditions outside these

structures are beyond the control of the building’s tenants. The inner layers are protected by a

single layer of exterior physical security controls, which leaves little space for error.

Buildings, Doors, Windows and Glass:

Perimeters are defined by buildings. In metropolitan locations, the outermost perimeter and

outer layer of security control for the entire facility may be the doors, walls, and windows of

office buildings. In other settings, buildings can also additionally function as a part of the

outer perimeter or as a first layer of the internal perimeter. Controlling doors, windows and

passages for ducting and conduits is essential. Entry ports from the exterior of the building

into the interior of the building are required for power, communications, and heating,

ventilation, and air condition systems. To prevent human access, functional openings bigger

than 96 square inches should be adjusted. Locking and alarming windows is a good idea.

Entry or tampering should set up alarms.

The type of glass used in windows varies depending on where the window is located and

what it is used for. Windows on a perimeter wall at a ground level plainly require a stronger

glass than those on upper floors or inside the perimeter. They may be required to be
bulletproof in specific situations. In some cases, specific glass may be necessary, such as in

earthquake-prone areas.

When not in use, doors should be locked, and when in use, they should be regulated. Controls

range from mechanical or electronic access control systems required cards, card readers, or

access codes to guards at the door managing admission and exit. Exterior doors, also known

as perimeter doors, must be fortified and are typically made to be tougher than inside doors.

Locks, Keys, and Combinations:

Locks are an important component of physical security. They are a low-cost and straight-

forward method to preventing unwanted access. The initial purchase, installing, and control

of their use are the most expensive aspects of locks. Little maintenance is necessary

depending on usage. Even if any lock may be broken, the higher the lock’s quality, the longer

it will take. The failure to protect locks, keys, and combinations correctly is perhaps the most

vulnerable part of locks, therefore control is essential. Any locking device can become

inoperable due to poor key control. The issuance of master keys, particularly grand master

keys, should be carefully restricted.

Ensure that all locks, keys, and combinations are accounted for. Employees should be given

keys and combinations in accordance with their job requirements. Locks, keys, and

combinations should not be supplied unless there is a specific necessity. A permanent record

of all keys or lock combinations issued or assigned to employees must be retained.

Areas, Rooms, Containers, and Safes:

There are open work areas, separate offices and rooms, storage containers, and safes inside

structures. The way they’re protected is determined by how they’re used and the value of the

assets they contain. Employees in these locations must recognize that they are also

responsible for access control, which means that anyone who is unfamiliar with them or who
is not wearing a current, corporate badge should be questioned about their need to be in the

area. Additional controls are required in areas or rooms where more sensitive work is

performed or sensitive information and materials are stored. The most straightforward

approach to implement these controls is to utilize locking devices or access control systems at

each entryway.

References
Fennelly, L. J. (2012). Effective Physical Security (4 ed.). Butterworth-Heinemann.
Physical Security Layers Provide Added Protection. (2013, April). Retrieved from ALTEC
Systems.Inc: https://www.altecsystems.com/physical-security-layers-add-protection/

You might also like