Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Server Room / IT Standards, guidelines, legislation etc

Posted on 2011-03-06
2
Medium Priority
?
2,420 Views
Last Modified: 2012-06-05
Im currently putting a proposal together for the expansion of our IT dept. We currently have a team of 4, spread across management office, small office, and server room - we're very low on space, the server room is also used for storage, which is a fire hazard.

What i'm looking for is some kind of standards, guidelines, things to quote in the proposal, eg according to ISO blah blah a server room should .....

This would ideally cover physical space, fire risks and working space for the IT team.

I've had a search around and can't really find anything that I can apply to this except the 11 cubic metres per person of working space.

Thanks for any help.
0
Comment
Question by:gmbaxter
2 Comments
 
LVL 14

Accepted Solution

by:
amichaell earned 1500 total points
ID: 35055153
A few things to read over:

http://resources.infosecinstitute.com/cissp-domain-physical-and-environmental-security/

http://www.csoonline.com/article/220665/19-ways-to-build-physical-security-into-a-data-center

http://www.sans.org/reading_room/whitepapers/awareness/data-center-physical-security-checklist_416

You can probably find additional good material at sans.org.  Also consider signing up at cccure.org, going to the Main Library and looking at the physical security documents.
0
 
LVL 11

Author Closing Comment

by:gmbaxter
ID: 35346235
Thanks for your help
0

Featured Post

New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Suggested Courses

782 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question