Build & Secure Data Center
Western Governors University
,BUILD & SECURE DATA CENTER 2
Table of Contents
Summary.....................................................................................................................................................3
Review of Other Work.................................................................................................................................4
Changes to the Project Environment............................................................................................................6
Methodology...............................................................................................................................................7
Project Goals and Objectives.......................................................................................................................8
Project Timeline........................................................................................................................................10
Unanticipated Requirements......................................................................................................................11
Conclusions...............................................................................................................................................11
Project Deliverables...................................................................................................................................12
References.................................................................................................................................................13
Appendix A...............................................................................................................................................14
Appendix B...............................................................................................................................................15
Appendix C...............................................................................................................................................16
, BUILD & SECURE DATA CENTER 3
Summary
FakeBiz is a regional service provider that began as a reseller of communications services
and have recently experience large growth. They are looking to compete with larger companies
but have been confronted with a problem. The problem being that their current environment is
running slow because they had virtualized their system and network with a cloud service named
SoftMicro. FakeBiz is having a difficult time managing the systems that were hosted on
SoftMicros IAAS service. Another issue FakeBiz was concerned with was the datacenter breach
SoftMicro had experienced prior to our proposal. The physical breach was caused by 2 people
who had impersonated maintenance employees who were there to repair a condensing unit.
Luckily, FakeBizs’ customer data was not compromised by the breach. These are the events that
prompted FakeBiz to request a proposal from FKM Enterprises to build a secure and functional
on-premise datacenter.
The project completed successfully with a few minor revisions. Let’s begin with the
deliverables. For the first deliverable we provided the FakeBiz stakeholders a proposed floor
plan (Appendix A) that was immediately approved. The design required a security desk to ensure
the no unauthorized personnel accessed the datacenter floor. Anyone attempting to access the
datacenter would be greeted by the security desk and only those with approved appointments
from FakeBiz would be allowed to enter the facility. Being that a datacenter is a 24 by 7
operation the security desk is manned by a guard for an 8-hour duration per shift. As part of this
design we implemented a Data Center team. This team would be responsible for the datacenter
operations including escorting personnel into the facility and ensure the person is only working
on the systems/devices listed in the appointment or change. All changes to the datacenter
environment would be entered in a change management system that would need approval from