SlideShare a Scribd company logo
Coromatic Academy
Open Compute Project, Critical Facilities Operations Framework
Process: Security and Access
Rev 2020-08-03
Information classification: Public
Contents
• Process overview
• Lessons learned / customer experiences
• Final notes
SECURITY AND ACCESS
OCP Critical Facilities Operations Framework
Site Operations
Integration
Terms &
Conditions
OCP CFOPS Delivery model
Incidents
Work Orders & Projects
On-site Access
Service Levels
Organization
KPI Monitoring
& Reporting
Lifecycle &
Financial
Mgmt
On-site
services
Security &
Access
Maintenance
In / outdoor
FM
Site
assistance
Site Inspection
Audits and
Compliance
Site Management
Delivery Support
Service Level
Mgmt
Lifecycle &
Financial
Mgmt
WO & Project
Mgmt
Monitoring &
Reporting
Governance
and BCP
Advisory and
Benchmarking
Supply Chain
and Sourcing
Service Desk
24/7
Incident Mgmt
Team &
Suppliers
Capacity
Mgmt &
Optimization
Document
Mgmt
Compliance
Mgmt
Service
Improvements
Asset List
Border List
Customer
Managed
Operating
Center
Source: OCP CFOPS 2019 v1.4
Security and Access
MindMap Overview Process Summary
The security and access process, procedures and building construction
should be appropriate to the assets that they are protecting. This would
include critical assets in the primary area as well as site systems in other
parts of the net floor area.
Perimeter protection
A critical facility should be appropriately protected against threats that may
break the perimeter. By protecting against external and environmental
threats, i.e. man-made or natural disasters, it is focused on ensuring that
only designated access points can be used to gain entry to the critical facility.
Typical services may include patrolling by guards or CCTV monitoring of
different parts of the building and its external premises.
Furthermore, the building construction itself may allow for several
protective layers or zones which can increase the level of the perimeter
protection and further protect against breaches outside the ordinary access
control points.
Source: OCP CFOPS 2019 v1.4
Lessons learned / Customer experiences
“Every time we have US or UK based site Owners ask us to
manage their sites, they expect us to have armed on-site
guards 24/7.
It usually does not take very long to convince them of the
cost benefits and reliability of remote security monitoring
with scheduled patrols and call-outs, especially when
considering the protection classification based on the
passive security measures of the building itself and the
restrictions on armed security guards…”
Security and Access
MindMap Overview Process Summary
The security and access process, procedures and building construction should be
appropriate to the assets that they are protecting. This would include critical
assets in the primary area as well as site systems in other parts of the net floor
area.
Access control
All personnel, visitors and deliveries to the site should be registered and processed
according to operational procedures where at least the following should be made:
• Verification of identity, i.e. authentication
• Verification of authorization
• Logging of access
Remote monitoring of alarm systems and CCTV is normally used to control access
to premises or rooms when a correct authentication has been performed.
Appropriate controls are put in place to ensure that access control audit logs
cannot be altered, tampered, or deleted, thus destroying evidential integrity. This
integrity is generally required to support a potential criminal prosecution because
of a security incident.
The access control system audit logs should be inspected on a recurring basis.
Source: OCP CFOPS 2019 v1.4
Lessons learned / Customer experiences
“The importance of separating accountabilities have proven to be a
success factor to us:
the Site Owner is accountable for authorizing who should be allowed
into the premises, while the outsourced Site Access service provider is
accountable for authenticating individuals wanting to gain access.
This means that if a person is properly authenticated and has the
authorization to gain access they will be let in. Otherwise not.
By independent reviews of the access logs, it is validated that these
procedures are followed diligently.
We even have service levels with penalties for this process.”
Final notes
• Passive perimeter protection should be complemented
by active protection measures
• Access control relies on a well managed process for
“Team & Suppliers Management” (Staff Register)
• On-site works should always include updating and
finalizing related documentation and service records
• Handling of personal data need to be GDPR compliant
Questions?
coromatic.com
10. Process: ocp cfops security and access

More Related Content

PPTX
1. Process: ocp cfops incident mgmt
PPTX
3. Process: ocp cfops lifecycle and financial mgmt
PPT
Ocp framework.mind map.2019v1.4
PPTX
9. Process: ocp cfops team and suppliers mgmt
PPTX
13. Process: ocp cfops site inspections
PPTX
14. Process: ocp cfops audits and compliance reviews
PPTX
15. Process: ocp cfops: site assistance
PPTX
4. Process: ocp cfops monitoring and reporting
1. Process: ocp cfops incident mgmt
3. Process: ocp cfops lifecycle and financial mgmt
Ocp framework.mind map.2019v1.4
9. Process: ocp cfops team and suppliers mgmt
13. Process: ocp cfops site inspections
14. Process: ocp cfops audits and compliance reviews
15. Process: ocp cfops: site assistance
4. Process: ocp cfops monitoring and reporting

What's hot (20)

PPTX
2. Process: ocp cfops service level mgmt
PPTX
7. Process: ocp cfops compliance mgmt
DOCX
4. ocp cfops.monitoring reporting.guideline.2019.5
PPTX
11. Process: ocp cfops maintenance
PPTX
5. Process: ocp cfops work orders and project mgmt
PPTX
6. Process: ocp cfops capacity mgmt and optimization
PPTX
16. Process: ocp cfops delivery support
PPTX
8. Process: ocp cfops document mgmt
PPTX
17. Process: ocp cfops integration
DOCX
17. ocp cfops.integration.guideline.2019.1
PPTX
12. Process: ocp cfops indoor outdoor fm
PPTX
0. ocp cfops flyby
DOCX
8. ocp cfops.document mgmt.guideline.2019.2
PPT
IAB Europe Metrics & KPIs Brand Advertiser Bulletin
PDF
RealWinWin Wholesale Rebate Administration Services
PDF
Telefonica Case Study
PPTX
Visionwaves Knowledge Days - in control dashboards
PPTX
Generic Presentation EEIS
PDF
Shared Services_Compliance_credential
PDF
Revisiting the Four Pillars Supporting an Effective BSA/AML Compliance Program
2. Process: ocp cfops service level mgmt
7. Process: ocp cfops compliance mgmt
4. ocp cfops.monitoring reporting.guideline.2019.5
11. Process: ocp cfops maintenance
5. Process: ocp cfops work orders and project mgmt
6. Process: ocp cfops capacity mgmt and optimization
16. Process: ocp cfops delivery support
8. Process: ocp cfops document mgmt
17. Process: ocp cfops integration
17. ocp cfops.integration.guideline.2019.1
12. Process: ocp cfops indoor outdoor fm
0. ocp cfops flyby
8. ocp cfops.document mgmt.guideline.2019.2
IAB Europe Metrics & KPIs Brand Advertiser Bulletin
RealWinWin Wholesale Rebate Administration Services
Telefonica Case Study
Visionwaves Knowledge Days - in control dashboards
Generic Presentation EEIS
Shared Services_Compliance_credential
Revisiting the Four Pillars Supporting an Effective BSA/AML Compliance Program
Ad

Similar to 10. Process: ocp cfops security and access (20)

PPTX
Demystifying CMMC: Real-World Insights from ControlCase Experts
PPTX
Compliance
PPTX
20170912_Identity_and_Access_Management.pptx
PDF
Profile_Kishore Sundar
PDF
Rest Solution : NOC-as-a-service
PDF
Analytical Instrument Qualification - USP chapter 1058 revision
 
PDF
Identity & Access Management for Securing DevOps
PDF
Cyber_Management_Issues.pdf
PPT
Audit Practice at CipherTechs
PPTX
711652894-Implementation-Plan-for-TechCorp-s-IAM-Platform.pptx
PDF
CYB 102 – Fundamentals of Cyber Security .pdf
PPT
How much does it cost to be Secure?
PPTX
CISM_WK_2.pptx
PPTX
MomentumNI Flash Event 10 Jul 14 - Irish GCSC
PDF
Everything You Need to Know About Testing Banking Domain Applications.pdf
PDF
Preparing for Inspections in eTMF
PDF
How auditable is your disaster recovery program
PPTX
Vendor Management System - Introduction2
PDF
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
PPT
6 service operation
Demystifying CMMC: Real-World Insights from ControlCase Experts
Compliance
20170912_Identity_and_Access_Management.pptx
Profile_Kishore Sundar
Rest Solution : NOC-as-a-service
Analytical Instrument Qualification - USP chapter 1058 revision
 
Identity & Access Management for Securing DevOps
Cyber_Management_Issues.pdf
Audit Practice at CipherTechs
711652894-Implementation-Plan-for-TechCorp-s-IAM-Platform.pptx
CYB 102 – Fundamentals of Cyber Security .pdf
How much does it cost to be Secure?
CISM_WK_2.pptx
MomentumNI Flash Event 10 Jul 14 - Irish GCSC
Everything You Need to Know About Testing Banking Domain Applications.pdf
Preparing for Inspections in eTMF
How auditable is your disaster recovery program
Vendor Management System - Introduction2
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
6 service operation
Ad

Recently uploaded (20)

PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Digital Logic Computer Design lecture notes
PDF
composite construction of structures.pdf
PPTX
Welding lecture in detail for understanding
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
PPT on Performance Review to get promotions
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Construction Project Organization Group 2.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
bas. eng. economics group 4 presentation 1.pptx
R24 SURVEYING LAB MANUAL for civil enggi
Internet of Things (IOT) - A guide to understanding
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
573137875-Attendance-Management-System-original
CH1 Production IntroductoryConcepts.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
UNIT 4 Total Quality Management .pptx
Digital Logic Computer Design lecture notes
composite construction of structures.pdf
Welding lecture in detail for understanding
Model Code of Practice - Construction Work - 21102022 .pdf
Foundation to blockchain - A guide to Blockchain Tech
PPT on Performance Review to get promotions
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Construction Project Organization Group 2.pptx
OOP with Java - Java Introduction (Basics)
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...

10. Process: ocp cfops security and access

  • 1. Coromatic Academy Open Compute Project, Critical Facilities Operations Framework Process: Security and Access Rev 2020-08-03 Information classification: Public
  • 2. Contents • Process overview • Lessons learned / customer experiences • Final notes
  • 3. SECURITY AND ACCESS OCP Critical Facilities Operations Framework
  • 4. Site Operations Integration Terms & Conditions OCP CFOPS Delivery model Incidents Work Orders & Projects On-site Access Service Levels Organization KPI Monitoring & Reporting Lifecycle & Financial Mgmt On-site services Security & Access Maintenance In / outdoor FM Site assistance Site Inspection Audits and Compliance Site Management Delivery Support Service Level Mgmt Lifecycle & Financial Mgmt WO & Project Mgmt Monitoring & Reporting Governance and BCP Advisory and Benchmarking Supply Chain and Sourcing Service Desk 24/7 Incident Mgmt Team & Suppliers Capacity Mgmt & Optimization Document Mgmt Compliance Mgmt Service Improvements Asset List Border List Customer Managed Operating Center Source: OCP CFOPS 2019 v1.4
  • 5. Security and Access MindMap Overview Process Summary The security and access process, procedures and building construction should be appropriate to the assets that they are protecting. This would include critical assets in the primary area as well as site systems in other parts of the net floor area. Perimeter protection A critical facility should be appropriately protected against threats that may break the perimeter. By protecting against external and environmental threats, i.e. man-made or natural disasters, it is focused on ensuring that only designated access points can be used to gain entry to the critical facility. Typical services may include patrolling by guards or CCTV monitoring of different parts of the building and its external premises. Furthermore, the building construction itself may allow for several protective layers or zones which can increase the level of the perimeter protection and further protect against breaches outside the ordinary access control points. Source: OCP CFOPS 2019 v1.4
  • 6. Lessons learned / Customer experiences “Every time we have US or UK based site Owners ask us to manage their sites, they expect us to have armed on-site guards 24/7. It usually does not take very long to convince them of the cost benefits and reliability of remote security monitoring with scheduled patrols and call-outs, especially when considering the protection classification based on the passive security measures of the building itself and the restrictions on armed security guards…”
  • 7. Security and Access MindMap Overview Process Summary The security and access process, procedures and building construction should be appropriate to the assets that they are protecting. This would include critical assets in the primary area as well as site systems in other parts of the net floor area. Access control All personnel, visitors and deliveries to the site should be registered and processed according to operational procedures where at least the following should be made: • Verification of identity, i.e. authentication • Verification of authorization • Logging of access Remote monitoring of alarm systems and CCTV is normally used to control access to premises or rooms when a correct authentication has been performed. Appropriate controls are put in place to ensure that access control audit logs cannot be altered, tampered, or deleted, thus destroying evidential integrity. This integrity is generally required to support a potential criminal prosecution because of a security incident. The access control system audit logs should be inspected on a recurring basis. Source: OCP CFOPS 2019 v1.4
  • 8. Lessons learned / Customer experiences “The importance of separating accountabilities have proven to be a success factor to us: the Site Owner is accountable for authorizing who should be allowed into the premises, while the outsourced Site Access service provider is accountable for authenticating individuals wanting to gain access. This means that if a person is properly authenticated and has the authorization to gain access they will be let in. Otherwise not. By independent reviews of the access logs, it is validated that these procedures are followed diligently. We even have service levels with penalties for this process.”
  • 9. Final notes • Passive perimeter protection should be complemented by active protection measures • Access control relies on a well managed process for “Team & Suppliers Management” (Staff Register) • On-site works should always include updating and finalizing related documentation and service records • Handling of personal data need to be GDPR compliant

Editor's Notes

  • #12: Clear market leader in turnkey data centers and other critical facilities Highly skilled and experienced workforce operating out of 20 locations Unrivalled experience as a full-service provider of turnkey critical facilities solutions Proven international delivery capabilities Strong Nordic customer base across a wide range of industries