Hutchison Telecommunications HGC in Hong Kong has a prominent position in the global data center field. The security deployment of the data center includes multi-level projects, such as physical facilities, network architecture, data protection and operation management, etc., and a strict security system has been built to provide reliable protection for all kinds of customers.
Hutchison Telecommunications HGC data center will avoid areas with high incidence of natural disasters such as earthquakes and floods in the building site selection. The data center building structure is solid and has strong earthquake resistance and fire resistance. The use of fireproof materials such as walls and ceilings meets high-standard fire protection regulations and can effectively prevent the spread of fire.
In terms of access control management, the data center has a multi-level access control system. Entering the data center requires multiple identity authentication, including passwords, fingerprint recognition, and face recognition. For example, the data center located on the 4th floor of Taikoo Warwick Building in Crusoe Bay, Hong Kong, only authorized personnel are allowed to enter with access cards with specific permissions, and surveillance cameras are installed in the access control area to monitor the entry and exit of personnel in real time 24 hours a day. For important areas, such as core computer rooms, two-factor or multi-factor authentication is also used to further enhance security.
Video surveillance is also an important part of physical security. High-definition surveillance cameras are installed in all areas of the data center to monitor the computer room, corridors, entrances and exits in all directions without blind spots. The monitoring data is stored in real time, and the storage period meets the requirements of relevant regulations. It is generally kept for several months so that it can be reviewed retrospectively in the event of a security incident.
Network security is crucial in the data center. HGC data center deploys firewalls to block external illegal network access and attacks. The firewall has deep packet inspection capabilities, which can perform fine analysis of network traffic, identify and intercept malicious traffic, such as DDoS attacks, port scans, etc. By configuring access control policies, external networks are restricted from accessing servers and services within the data center, and only legal traffic is allowed to pass.
Intrusion detection and prevention systems (IDS/IPS) monitor network traffic in real time to detect and prevent intrusions in a timely manner. IDS analyzes network traffic in real time and immediately issues an alarm once suspicious activities are detected; IPS can not only detect, but also take proactive measures to block attacks, such as automatically blocking the attack source IP address. For example, when a large number of abnormal connection requests are detected from a certain IP address in a short period of time, the IDS/IPS system can quickly identify it as a DDoS attack and defend against it.
In terms of network architecture, redundant design is used to ensure high availability and stability of the network. There are multiple network links, and different links come from different network providers to avoid network interruption due to single link failure. At the same time, the internal network of the data center adopts a dual-core switch architecture, and the core switches are redundantly backed up. When a core switch fails, the traffic can be automatically switched to another one to ensure uninterrupted network communication.
Data backup and recovery are the key to data security. HGC Data Center has formulated a complete backup strategy to perform regular full and incremental backups of customer data. The backup is stored on a variety of media, including disk arrays, tape libraries, etc., and some backup data is stored off-site to prevent data loss due to local disasters. For example, incremental backups are performed every day and full backups are performed once a week. While the backup data is stored in the local data center in Hong Kong, it is also encrypted and transmitted to a remote data center for storage. When data is lost or damaged, the backup data can be used to quickly restore it to ensure business continuity.
Data encryption technology runs through the entire process of data storage and transmission. In terms of data storage, important data is encrypted and stored, and advanced encryption algorithms such as AES encryption algorithm are used to ensure the security of data on the storage medium. Even if the storage device is lost or stolen, unauthorized personnel cannot read the data. During data transmission, data is encrypted through SSL/TLS encryption protocol to prevent data from being stolen or tampered with during network transmission. For example, when customers access data on servers in the data center through the network, the data is always encrypted during transmission.
Personnel security management is the basis of operational security. HGC Data Center conducts strict background checks and authority management on employees. When recruiting employees, their work experience, criminal records, etc. are fully reviewed to ensure that the employee's background is reliable. After employees join the company, they are assigned minimum permissions according to their job positions and responsibilities, and only the permissions required to complete the work are granted to avoid abuse of permissions. For example, computer room maintenance personnel only have the authority to operate computer room equipment, but cannot access customer data.
Improve security management systems and processes. Formulate detailed daily operation specifications, emergency response plans, etc. Daily operation specifications cover various aspects such as equipment maintenance, system upgrades, and data backup, and employees must strictly follow the specifications. Emergency response plans formulate response measures for various emergencies such as fires, earthquakes, and cyber attacks, and organize emergency drills regularly to ensure that employees can take quick and effective actions to reduce losses when emergencies occur. For example, fire emergency drills are organized regularly to simulate fire scenes so that employees are familiar with evacuation routes and the use of fire-fighting equipment.
Regular security audits and assessments are also an important part of operational safety management. Professional security agencies can audit and evaluate data centers, check the implementation of security policies, and find security vulnerabilities. Continuously improve and rectify based on the results.