You are on page 1of 11

CIO 100 SYMPOSIUM

GOVERNMENT DATA CENTER


November 2011 Magero Gumo Director, Shared Services

Background
Started in 2008
Benchmarks in South Africa and Schengen China Capacity Building was carried out as the GDC was being implemented The Facility is located 20 km from the City Centre in highly secure environment Investment from a concession loan from the Peoples Republic of China

Architecture
GCCN
Internet
Core Router Core Router Core Router Firewall Firewall Firewall Load Balance Load Balance Aggregation Switch Aggregation Switch IDS Load Balance Aggregation Switch IDS Load Balance Aggregation Switch Aggregation Switch IDS Aggregation Switch Firewall Core Router 2.5G POS 2.5G Pos GE FE T3 SAN KVM

DNS
KVM Switch Access Switch

Web

Mail

Proxy

Government Internal OA System

Public Service Zone

Internal Common Zone

Finance Ministry

Ministry Zones

Immigration Ministry

Aggregation Switch

Aggregation Switch

Secondary DC
Storage and Backup

KVM Authentication Server

Firewall Key (MA5200F) Firewall Access Switch VPN Router Access Switch Firewall

Access Switch

VPN
Maintenance Area Customer Operation Remote Access Network Management System Server

Network Monitor

Page 3

Why?
Increased IT demand Increasing cost pressures Responsiveness to change

Increasing storage needs Increasing power consumption Data center expansion

Reducing costs is increasingly a priority Power costs are rising Data center operating costs are increasing

Technology densities growing Data centers are aging Power and cooling needs

Value Proposition
Prevent Protect Manage Recover

Services to assess and plan for a resilient government infrastructure

Services to remotely store, protect & recover vital government information

Services to provide fault-tolerant, failureresistant infrastructure with near-zero recovery times

Services to recover business & technology following a negative event

Continuity & Resiliency Services

IT Recovery

Tape Backup Services

Replication/Mirroring Services

Work Area Recovery

Layers of Resilience
Strategy

Crisis management process Articulated governance model Resilience used as competitive advantage Command center identified Geographic diversity of staff Defined roles and responsibilities Identify most critical processes Contingencies integrated into all critical processes Key links with external companies

Resilience Strategy

Continuity Plan

Organization

Processes

Business Impact Analysis

Applications and Data

Mirroring for critical data Remote backup facilities Backups of workstation data for mobile workers / counties Server and storage virtualisation Rapid Server provisioning Specialist Recovery Expertise Govt Data Centre Disaster Recovery Construction Continued network access to MDAs

Data Management

Technology

IT Recovery

Facilities

Work Area & Data Centre

As an analogy to its medieval predecessors, IT security requires a well-tuned and well-placed mix of different technologies. Setting conditions for information
security derived from business goals, their documentation, communication and organizational responsibilities Classification of assets; identification of threats to assets, their impacts and associated risks

Security

Policies, Org.

Risk

Effective and efficient information security program

Definition of standards; Choice and implementation of technology, management processes and procedures
Implementation

Audit

Operation

Assessment of degree of completeness of implementation and effectiveness of information security measures


7

Security education and awareness programs for end users; implementation of operational processes and procedures

Dont forget to activate the human firewall rules need to be communicated and employees need to be made aware of them and sensitized as to their content and reasoning.
Government Goals

Information Security Policy

Issue-based Security Policies


e.g. Internet, e-mail, remote access, backup

Standards, Processes, Procedures


e.g. client and server configuration for Windows and UNIX, user administration, backup, incident handling, network access

100 percent security or assurance cannot be achieved

but we as a government are trying to do whatever is ...

technically feasible and practical, economically reasonable, legally required, and socially acceptable.

Questions?

You might also like