S 2.6 Technical infrastructure room

Logo Raum für technische Infrastruktur

Description

As a rule, technical infrastructure rooms house those devices and equipment items and facilities which require no, or infrequent, human attendance. Usually, these will be distributors of internal supplies (e.g. PTT cable lead-in room, voltage transfer room, medium-voltage transfer room, low-voltage main distributor). In some instances, these rooms may also house the fuses for power supply. Installation of other equipment (uninterruptible power supply, star coupler, etc.) is also conceivable. Even a network server might be accommodated here if a specific room (module S 2.4 Server room) is not available.

Threat scenario

The following typical threats to the IT-Grundschutz of a technical infrastructure room are assumed to exist:

Force Majeure

T 1.4 Fire
T 1.5 Water
T 1.7 Inadmissible temperature and humidity

Organisational Shortcomings

T 2.1 Lack of, or insufficient, rules
T 2.6 Unauthorised admission to rooms requiring protection

Technical Failure

T 4.1 Disruption of power supply
T 4.2 Failure of internal supply networks
T 4.6 Voltage fluctuations / overvoltage / undervoltage

Deliberate Acts

T 5.1 Manipulation or destruction of equipment or accessories
T 5.3 Unauthorised entry into a building
T 5.4 Theft
T 5.5 Vandalism

Method recommendation

To secure the information system examined, other modules will need to be implemented in addition to this module. These modules are selected based on the results of the IT-Grundschutz modelling process.

A series of safeguards need to be implemented for infrastructure rooms, from planning the infrastructure rooms to their live operation. The steps to take to accomplish this as well as the safeguards to implement in each phase are listed in the following.

Planning and design

When planning infrastructure rooms, a series of safeguards must be implemented for the power supply installation, the air conditioning system (when needed), and for fire protection to ensure that sufficient physical security is provided. This also includes

ensuring that no water pipes run through such a mostly unoccupied room (if this is possible) since leaks can cause large amounts of damage and can even lead to the failure of the entire information system. When higher security requirements apply, infrastructure rooms should also be protected against forced entry by specially secured doors and windows, as they often represent preferred targets for attack.

Implementation

Only those persons entrusted with the corresponding maintenance tasks should be granted access to the infrastructure room, and it should be taken for granted that smoking is prohibited in this room.

Operation

Rooms for technical infrastructure should always be locked, if the equipment installed there is not locked in cabinets in such a way that unauthorised use is not possible.

The bundle of safeguards for technical infrastructure rooms is presented in the following:

Planning and design

S 1.3 (A) Appropriate segmentation of circuits
S 1.7 (A) Hand-held fire extinguishers
S 1.10 (Z) Safe doors and windows
S 1.18 (Z) Intruder and fire detection devices
S 1.24 (C) Avoidance of water pipes
S 1.26 (W) Emergency circuit-breakers
S 1.27 (B) Air conditioning of the technology / in technology rooms
S 1.31 (Z) Remote indication of malfunctions

Implementation

S 2.17 (A) Entry regulations and controls
S 2.21 (A) Ban on smoking

Operation

S 1.15 (A) Closed windows and doors
S 1.23 (A) Locked doors