The Datacenter Policy defines guidelines and controls that will ensure smooth operations and adequate access control mechanisms.
All datacenters, rooms, or other areas of Company offices containing IT devices (servers, network devices, storage, etc.) which are critical for business operations, data security, or any other business reasons, should be protected. Environmental parameters should be maintained to ensure normal operations of all critical IT systems. Access to these areas should be restricted to authorized personnel only.
1.1 PROCEDURE OWNER
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
4. ROLES AND RESPONSIBILITIES
5. ENVIRONMENTAL PARAMETERS
6.1 GRANTING DATACENTER ACCESS
6.2 REVOKING DATACENTER ACCESS
6.3 REVIEWING DATACENTER ACCESS
6.4 VISITOR ACCESS
6.5 HANDLING ENVIRONMENTAL EXCEPTIONS
8. FINAL CONSIDERATIONS
8.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
8.2 DOCUMENT REVISION
The objective of the Network Security Policy is to ensure the security of data transfers across Company’s networks and that an adequate level of security exists to protect the network infrastructure.