Solved

Physical ACL's

Posted on 2009-04-01
1
161 Views
Last Modified: 2012-05-06
On your server rooms / data centres, do you have an unescorted access control listing posted at the door or whatever you use as an entry point? I have seen these all over our facility but I am not really sure of the rationale behind why people use them? What security benefits or accountability benefits do they bring?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 24046188
I'm not sure what your describing, but just about every DC I've been in had a magnetically locked door, with some kind authenticator to unlock, be it a hand scanner, retina scanner, or key card/fob access. I've been to one small DC that had a 10 digit keypad (password was only 5 numbers) on the door, so there was no accounting other than the camera inside the room. On the inside of the magnetic doors, to be let out I've seen motion detectors above the door (bad idea btw, think of sliding a yard stick under/inbetween the doors), door loaded switch (push the bar on the door), a switch on the side of the door, or again a key-card/fob.
Inside the DC, you can have the cabinets individually locked, or even caged off to separate clients or even to just provide more security.
-rich
0

Featured Post

Are You Ransomware's Next Victim?

Worried about ransomware attacks hitting your organization?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with WatchGuard Total Security!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question