SME REG No: 1391661

Data Center Security Design and Blueprint

SAS Solution can provide the in-depth knowledge and experience in developing Data Center Security standards that meet all types of data center topologies and technical requirements.

DATA CENTER SECURITY ARCHITECTURE

From the physical design of Tier I, II and III data centers to the logical architecture design; DTS Solution is able to offer a complete end-to-end pre and post sales consulting services to help your organization make the transition to the next generation data center;
Data centers can be categorized into two areas; ones that generate revenue and ones that provide operational support and services functions to the business;

New developments within Data Center industry such as flat fabric, any to any connectivity with extreme low latency, developments within the Ethernet protocol, on demand security services that are agile and dynamic based on applications, complete provisioning lifecycle of infrastructure are some of the key component what makes a data center design architecture into reality. By working with best-in-class technology vendors DTS Solution are able to offer organizations that are looking to transform their legacy data centers into the next-generation data centers based on simplified architecture, agile security services, use of shared resources and automation of operational and maintenance functions.

Physical Data Center Design

Tier I, II and III – structured cabling TIA-942, ToR and EoR/MoR physical designs, power and energy efficiency, HVAC and safety requirements.

Data Center Architectural Design

  • Fabric Design – Ethernet Design, Data Center Bridging (DCB), Ethernet Flow Control (EFC) and Priority Based Forwarding (PBF)
  • Data Center Switching Design – Virtual Chassis / LAG / Multi-Chassis LAG / Layer 2 design
  • Physical and Virtual host/server connectivity requirements
  • Data Center Routing Design – Dynamic Routing / MPLS / VPLS
  • Data Center Security Design – Virtualization, Security Domains, IAM, Authentication, SIEM, Application Security, IPS
  • Data Center Service Layer – Application Delivery Control, Application Optimization, DLP, SSL Offload, Caching
  • Hyper-Convergence Data Center
  • SDN/NFV Enabled Data Centers

Data Center Services Matrix

  • Service / Traffic Flow
    • client to server connectivity (north to south)
    • server to server connectivity (east to west)
  • Replication / backup / synchronization traffic requirements
  • Information and Service Flow Analysis Service

DISTRIBUTED ORGANIZATION LEVEL

Organization Level Security and Conformity Requirements
Technical Security Requirements
Token Assignment
Token Authorization
Validators Security Control
Censorship Policy
Blockchain contract approval workflow
Entity Level Security Validation
Security Readiness Verification
HSM Crypto
Key Management
Application Security
Multi-Signature Co-Signing
Distributed Authorization Process

NETWORK AND APPLICATION LEVEL

Permissioned Network
Open or Hybrid Architecture
P2P Network Security Architecture
VPN and secure communication
Next Generation Firewalls
Security Zoning
Network Segmentation
Intrusion Prevention System
Web Application Security Controls
API Security Gateway
PKI Security Infrastructure
Virtual Machine Infrastructure
Data Center Switching
Data Center Routing
Protocol Security
In-band and Out of band Management
Threat intelligence
Phishing Security
Threat Hunting

GOVERNANCE LEVEL

Security Operations
Logging and Monitoring
Governance and Compliance
Risk Management
Data Security
Data Classification
Data Labelling
Transactional Records
Smart Contract Tagging
Security Approval Workflows
Information Security Policies
Security Processes and Procedures
Asset Management
Disaster Recovery
Backup and Restoration
Security Awareness and Training

Subscribe Our Newsletter

Sign up to our newsletter, so you can be the first to find out the latest news and tips about Cyber Security Programs, as well as general Chevening updates throughout the year.