A Looming Risk: Data Center Security

The rise in the use of AI models and the desire to operate a data-driven or data-centric organization has put a premium on having or sourcing large amounts of data. Proprietary or open source developers, analysts, and decision makers all need access to data. While most of us visualize the “cloud” as a vapor entity and might imagine ones and zeros moving through the ether, the reality is that data does actually need to be stored in real, physical mediums. The data centers that power the digital revolution are coming under increasing scrutiny from governments, industry, and, most concerning, adversaries, who seek to control the flow of data. Security and risk professionals must understand the types of data centers, threat vectors, and the implications of this data supply chain to their business. 

The Importance of Data Centers  

Data centers are critical components of modern infrastructure, providing the backbone for digital transformation across various domains. They store, process, and manage vast amounts of data, enabling organizations to deliver essential services globally. Recent years have seen a huge boom in data center construction, fueled by the growing demand for cloud services, AI, and data-driven applications. The data center market has been on a rapid upward trend, with investments and construction continuing to grow worldwide in 2024 

This surge is not only about quantity; it's also about the scale and types of data centers being built. The number of hyperscale data centers—massive facilities run by large companies like AWS, Microsoft Azure, and Google Cloud—has grown significantly to more than 1,000 in early 2024. These are huge, power-hungry centers that can consume 100 megawatts or more each. Simultaneously, there is an increase in smaller, more localized edge data centers that help speed data processing by bringing it closer to users. With all this growth, data centers have been drawing a lot more energy—about 220-250 terawatt-hours globally in 2022, based on numbers from the International Energy Agency (IEA).   

Understanding Data Centers 

Data centers are complex facilities composed of several key components that ensure the reliable storage, processing, and management of data. Physical infrastructure forms the core of a data center, including servers, storage devices, and networking equipment that handle data operations, along with power supplies such as UPS systems and generators to maintain uptime, and cooling systems like HVAC and CRAC units to regulate temperatures. Support systems are also crucial, including fire suppression systems to prevent damage from fires and security systems like access control and surveillance cameras to protect against unauthorized access. Additionally, communication infrastructure is essential for data centers, relying on robust internet connectivity, fiber optics, and cabling to enable seamless data transfer. 

Data centers vary significantly in size and scale, ranging from small server rooms for localized operations to large enterprise-level facilities and hyperscale data centers that support massive cloud providers. They are categorized using a tier system, developed by the Telecommunications Industry Association, which defines the level of redundancy, uptime, and fault tolerance. Tier I data centers have minimal infrastructure with basic redundancy, while Tier II offers partial redundancy for critical systems. Tier III data centers provide concurrent maintainability, allowing maintenance without downtime, and Tier IV facilities offer the highest level of fault tolerance, ensuring 99.995 percent uptime by incorporating fully redundant systems for power, cooling, and network connectivity, making them suitable for mission-critical operations. Their locations are strategically chosen, whether in urban areas for proximity to end users or rural settings to reduce real estate costs, and are often near fiber optic networks, power sources, or areas less prone to natural disasters to ensure continuous operations.  

The Risk Environment for Data Centers 

Physical Threats 

Physical threats to data centers are similar to those faced by all critical infrastructure, such as natural disasters, power outages, and vandalism, but physical threats have unique implications for data integrity. Natural disasters like earthquakes, floods, and fires can cause direct physical destruction of servers and storage devices, leading to irreversible data loss or data corruption from water damage and power surges. Power outages and utility failures present further risks; a sudden loss of power can interrupt data transactions, causing corruption or inconsistencies, while prolonged outages can result in data loss if backup systems fail. Vandalism, theft, and physical sabotage add another layer of risk; the theft of servers or deliberate destruction, such as cutting power lines or damaging equipment, can compromise critical data, especially if backups are not adequately secured. In the event of an armed conflict between countries, it is highly likely that data centers would be a prime target for conventional or unconventional warfare. 

Cyber Security Threats 

Data centers face unique cyber security challenges that extend beyond typical concerns for critical infrastructure, requiring specialized strategies to mitigate risks. They are frequent targets for external cyber attacks such as hacking, ransomware, and Distributed Denial of Service (DDoS) attacks, which can disrupt services and compromise sensitive data. Critical infrastructure sustained 13 cyber attacks per second in 2023, illustrating the scale of this threat. Insider threats add another layer of risk, as disgruntled employees or contractors can exploit access to sensitive systems, engage in data theft, or facilitate external attacks through social engineering. Furthermore, system and configuration vulnerabilities, such as software bugs and zero-day exploits, can be gateways for unauthorized access or data corruption.  

The Data Center Environment Itself 

Data security and cyber security, while interconnected, address different but complementary aspects of data center security.  Data security within a data center has a more nuanced scope, dealing specifically with protecting the integrity, confidentiality, and availability of the stored and processed data itself. This includes mitigating threats like data breaches and theft, which can occur due to unauthorized access arising from weak access controls or improper data handling practices within the data center environment.  

Data centers must also guard against data loss and corruption caused by accidental deletions, hardware failures, or ransomware encryption that can jeopardize the data stored in servers, storage arrays, or cloud environments. Moreover, data centers are responsible for ensuring compliance with data protection regulations as non-compliance can lead to substantial fines and reputational damage. This highlights that robust data center security is not limited to protecting the physical and network infrastructure but also about ensuring comprehensive data governance, proper access controls, secure backup solutions, and adherence to regulatory frameworks. Effective data center security strategies must seamlessly integrate cyber security measures with strong data security policies to safeguard against both external cyber threats and internal data management risks. 

How Do We Mitigate Risks to Data and Data Centers? 

Conduct a Risk Assessment 

When conducting a risk assessment for a data center, it is essential to consider the specific aspects of the data supply chain that a business relies on. This involves asset identification across the full spectrum of the data supply chain, including physical assets (like servers, power systems, and network infrastructure), cyber assets (such as software, cloud services, and networks), and data assets (which may encompass sensitive information, customer data, and intellectual property). A comprehensive threat assessment and vulnerability analysis must account for potential risks at each point in the data supply chain, from physical threats like hardware failures or power outages to cyber threats, such as ransomware or unauthorized access, that could compromise the flow of data. Additionally, data-specific threats like breaches, corruption, or loss due to improper handling need to be addressed.  

Audit Physical Security Integrity  

Effective environmental controls are a key component, involving the implementation of redundant power supplies like Uninterruptible Power Supply (UPS) systems and backup generators to prevent data corruption caused by power loss. Proper climate controls are also crucial to prevent damage from extreme temperatures. Waterless fire suppression systems should be installed to minimize the risk of water damage to servers and storage devices.  

Another critical layer is physical security measures, which include robust access controls like biometric authentication and RFID badges, along with surveillance systems to prevent unauthorized access. Regular audits of physical security and access logs help detect potential insider threats, ensuring a proactive security posture. Lastly, facility design and redundancy play a significant role in safeguarding data centers; designing facilities with redundant components such as dual power feeds and mirrored storage ensures continuous operation. Geographically diverse backup locations can further mitigate the impact of regional disasters. 

Establish Data Protection and Cyber Security Protocols  

Mitigating cyber threats requires a multi-layered approach that includes network segmentation, firewalls, and Intrusion Detection and Prevention Systems (IDS/IPS) to monitor and protect data center networks from external attacks. Regular software updates, vulnerability assessments, and comprehensive cybersecurity training for staff are essential to close security gaps and reduce the risk of unauthorized access or insider threats. For data-specific threats, data encryption, robust access control, and regular backups are fundamental strategies to prevent data breaches and loss. Establishing a compliance management program with regular audits ensures adherence to data protection regulations, reducing the risk of fines and reputational damage due to non-compliance. 

Adopt Best Practices for Overall Organizational Resilience 

An effective data center security strategy also involves comprehensive Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) for true organizational resilience. Developing and testing these plans is vital to prepare for potential incidents that could impact data integrity or availability. Regular risk assessments and simulated exercises help ensure readiness and identify areas for improvement.  

Adopting best practices for data center security involves a "Defense in Depth" approach that combines physical, cyber, and data security controls for comprehensive protection. Regular audits and compliance checks, aligned with industry standards like ISO 27001 and NIST, help maintain a high-security posture. Continuous monitoring through one of a multitude of Security Information and Event Management (SIEM) systems can provide proactive threat detection and response. Maintaining an adaptive security posture—by staying updated with evolving threats and regularly revising security plans—ensures that data centers remain resilient in the face of emerging risks. 

The mission can feel daunting and the path forward unclear. If you’d like to continue this discussion, provide feedback or are looking for assistance, OnSolve by Crisis24 is here to help. 

Matt Rasmussen

Matt Rasmussen is a 23-year U.S. Army Veteran who currently serves as an Assistant Professor and Course Director at the U.S. Army War College. Matt’s most recent operational assignments were first as an infantry battalion commander and then as a hand-selected combat advisor battalion commander. During his Army career, Matt has served at every operational echelon from platoon to division, and deployed to Iraq and Afghanistan four times.