The Datacenter Policy defines guidelines and controls that will ensure smooth operations and adequate access control mechanisms.
All datacenters, rooms, or other areas of Company offices containing IT devices (servers, network devices, storage, etc.) which are critical for business operations, data security, or any other business reasons, should be protected. Environmental parameters should be maintained to ensure normal operations of all critical IT systems. Access to these areas should be restricted to authorized personnel only.
CONTENT
1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. POLICY
4. ROLES AND RESPONSIBILITIES
5. ENVIRONMENTAL PARAMETERS
6. PROCESSES
6.1 GRANTING DATACENTER ACCESS
6.2 REVOKING DATACENTER ACCESS
6.3 REVIEWING DATACENTER ACCESS
6.4 VISITOR ACCESS
6.5 HANDLING ENVIRONMENTAL EXCEPTIONS
7. EXCEPTIONS
8. FINAL CONSIDERATIONS
8.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
8.2 DOCUMENT REVISION
Pages: 9
This bundle contains all the products listed in the Physical and Environmental section. Take advantage of the 25% OFF when buying the bundle!
The primary goal of the Incident Management process is to restore normal service operation as quickly as possible and minimize the adverse impact on business operations, thus ensuring that the best possible levels of service quality and availability are maintained.
The objective of the Network Security Policy is to ensure the security of data transfers across Company’s networks and that an adequate level of security exists to protect the network infrastructure.
Review Datacenter Policy.
You must be logged in to post a review.