ITS-PE-2: Data Center and Operations - Physical Access Authorizations


Purpose
Scope
Policy
Process
Audit
Responsibilities
Related Documents
Appendix

Purpose

This Control sets the requirements which govern physical access authorizations to the University of Chicago’s Enterprise Data Centers. 

Scope

These Controls apply to faculty, staff, contractors, and visitors and anyone else who requires access to the University of Chicago Enterprise Data Centers. The scope includes:

The process offers the following Enterprise Data Centers Security levels unless otherwise specified below:

Note: 1155, POD-A, POD-B, and POD-C meet High for the NIST SP 800-53 physical controls

Policy

Process

Authorized and Unauthorized Access

General access – All Data Centers – NIST High

Vendor Authorization

Access Termination

HIPAA

Audit

Quarterly reviews of the access logs (Electronic and written log book) and authorized access list will be performed by the Data Center Operation team.

Responsibilities

Listed below are the individuals involved with this Process and the major scope of their responsibility:

Related Documents

Policy and Procedure documents specific to IT Security, Change Management and Backup and Recovery.

Process Review Approval

Management will perform an annual review of this process. Based on the review, management may change this process to reflect its intentions and compliance requirements. Both IT Services and business users will be informed of any changes to this process and will be provided with a revised process.

Appendix

Sample Faculty/Staff Authorized Access Request

Please grant [User name] access to the 6045 Data Center. This form is being provided via email as signature of my approval. By requesting this access I explicitly agree to all policies and guidelines set forth by IT Services and validate that the employee requiring access has been made aware of all policies and guidelines that pertain to the 6045 Data Center. I and [Employee name] may also be held liable for any negative actions or damages to the 6045 Data Center.

Note: IT Services Infrastructure Services management team reserves the right to revoke access to any of the area(s) at any time, for any reason, without prior notification.

Section I - Employee Information - Employee Requiring Access

Name:

Title:

CNetID:

Phone:

Email:

Department:

Employee ID card number (# beginning 4*XXXX)

Section II - Approving Manager or Director - Approving Manager or Director

Name:

Title:

CNetID:

Phone:

Email:

Department:

Section III - Type of Access

Access should be allowed -

[ ] Permanently

[ ] Temporarily, ending on __/__/____ at __:__ CST.

Sample Contractor Authorized Access Request

Please grant [Contactor name] access to the 6045 Data Center. This form is being provided via email as signature of my approval. By requesting this access I explicitly agree to all policies and guidelines set forth by IT Services and validate that the contractor requiring access has been made aware of all policies and guidelines that pertain to 6045 Data Center. I and [Contractor name] may also be held liable for any negative actions or damages to the 6045 Data Center.

Note: IT Services, Infrastructure Services management team reserves the right to revoke access to any of the area(s) at any time, for any reason, without prior notification.

Section I - Contractor Information

Name:

Company Representative:

Representative Title:

Phone:

Email:

Target equipment and function of contractor:

Section II - Contractor Staff names:

Please list those who will be working on equipment/services listed is section I:

Name:

Name:

Name:

(Add additional lines as required)

Section III - Approving Manager or Director - Approving Manager or Director

Name:

Title:

Phone:

Email:

Department:

Employee CNET:

Section IV - Type of Access

Access should be allowed -

[ ] Permanently

[ ] Temporarily, ending on __/__/____ at __:__ CST

Sample Log Book Sign In sheet