Security check
Please login to your personal account to use this feature.
Please login to your authorized staff account to use this feature.
Are you sure you want to empty the cart?

BICSI 009-2019, Data Center Operations and Maintenance Best Practices, 2019
- BICSI International Standards
- TABLE OF CONTENTS
- INDEX OF FIGURES
- 1 Introduction [Go to Page]
- 1.1 General
- 1.2 Purpose [Go to Page]
- 1.2.1 ICT Operations
- 1.2.2 Facilities Operations
- 1.2.3 Data Center Management
- 1.3 Impact of Redundancy on Operations and Maintenance Procedures [Go to Page]
- 1.3.1 Standard Operating Procedures
- 1.3.2 Maintenance Operating Procedures
- 1.3.3 Emergency Operating Procedures
- 1.4 Categories of Criteria
- 2 Scope
- 3 Required Standards and Documents
- 4 Definitions, Acronyms, Abbreviations, and Units of Measurement [Go to Page]
- 4.1 Definitions
- 4.2 Acronyms and Abbreviations
- 4.3 Units of Measurement
- 5 Governance and Assessment [Go to Page]
- 5.1 Introduction [Go to Page]
- 5.1.1 Public Governance
- 5.1.2 Private Governance
- 5.2 Compliance [Go to Page]
- 5.2.1 Documentation
- 5.3 Voluntary Assessment Programs [Go to Page]
- 5.3.1 Overview
- 5.4 Types of Assessments [Go to Page]
- 5.4.1 Introduction
- 5.4.2 Risk Assessment
- 5.4.3 Data Center Operations and Maintenance Assessment
- 5.4.4 Security Assessment
- 6 Standard Operating Procedures [Go to Page]
- 6.1 Introduction
- 6.2 BICSI Class Definition and Standard Operating Procedures
- 6.3 ICT Cut-overs, Technology Refresh and Migration [Go to Page]
- 6.3.1 Cut-Overs
- 6.3.2 Change Control Process
- 6.4 Work Orders [Go to Page]
- 6.4.1 Introduction
- 6.4.2 Data Center Installation Work Order
- 6.4.3 Example of a Data Center Work Order Process for ITE
- 6.5 Work Safety [Go to Page]
- 6.5.1 Scope
- 6.5.2 Safety Planning
- 6.5.3 Safety Meetings and Briefings
- 6.5.4 Emergencies
- 6.5.5 Electrical Safety
- Figure 6-1 Example of a LOTO Electrical Safety Form
- Figure 6-2 Example of a LOTO Justification Form
- 6.5.6 Mechanical Safety
- 6.5.7 Personal Protective Equipment (PPE)
- 6.5.8 Work Place Safety Training
- Figure 6-3 Example LOTO Custody of Equipment Flow Chart
- 6.5.9 Accident Reporting
- Figure 6-4 Example of an Accident / Incident Reporting Form
- 6.6 Storage, Staging, and Related Tasks [Go to Page]
- 6.6.1 Storage
- 6.6.2 Staging
- 6.6.3 Packing and Unpacking
- 6.6.4 Manufacturer Testing
- 6.6.5 End User Burn-In
- 6.7 Interface with Data Center Users [Go to Page]
- 6.7.1 Data Center Service
- 6.7.2 Correspondences (Interface procedures)
- 6.7.3 Facility Operations
- 6.7.4 Facility Reports
- 6.7.5 Periodical Meetings
- 6.7.6 External Personnel Access
- 6.8 Equipment Delivery and Shipments [Go to Page]
- 6.8.1 Materials Management
- 6.8.2 Procurement Processes
- 6.8.3 Shipping Considerations
- 6.8.4 Receiving Materials
- 6.8.5 Handling Hazardous Materials
- 7 Security [Go to Page]
- 7.1 Introduction [Go to Page]
- Figure 7-1 Security Measures
- 7.2 Risk and Threat Assessment
- 7.3 Regulatory and Insurance Considerations [Go to Page]
- 7.3.1 Introduction
- 7.3.2 Regulations or Laws Affecting Security
- 7.4 Data Center Security Plan [Go to Page]
- 7.4.1 Introduction
- 7.4.2 General Recommendations
- 7.4.3 Physical Security Plan
- 7.4.1 Cyber/IT Security Plan
- 7.5 Physical Security Systems [Go to Page]
- 7.5.1 Access Control
- Figure 7-2 Levels of Access Control
- 7.5.2 Badging and Identification
- 7.5.3 Signage and Display Policy and Procedures
- 7.5.4 Fire Prevention, Detection and Suppression
- Figure 7-3 Example of a Visually Distinctive Expired Badge
- 7.5.5 Video Surveillance
- 7.5.6 Monitoring and Alarms
- 7.6 Material Control and Loss Prevention [Go to Page]
- 7.6.1 Introduction
- 7.6.2 Recommendations
- 7.6.3 Classification and Confidentiality of Sensitive Resources
- 7.6.4 Hazardous Material Storage
- 7.6.5 Disposal of Media and Printed Material
- 7.6.6 Theft
- 7.7 Data Center Personnel [Go to Page]
- 7.7.1 Introduction
- 7.7.2 Hiring of Personnel
- 7.7.3 Reporting
- 7.7.4 Terminations of Personnel
- 7.8 Building Site [Go to Page]
- 7.8.1 Site Access and Egress
- 7.8.2 Security Guards
- 7.8.3 Office Areas
- 7.9 Assessments
- 7.10 Computer Room and Critical Facility Areas Special Considerations [Go to Page]
- 7.10.1 Requirements
- 7.10.2 Recommendations
- 7.11 Cyber/IT Security Policy and Procedures [Go to Page]
- 7.11.1 Introduction
- 7.11.2 Passwords
- 7.11.3 Information Control
- 7.12 Event Response [Go to Page]
- 7.12.1 Physical Security
- 7.12.2 Cyber/IT Security Event Response
- 7.12.3 Post-Mortem Processes and Policies
- 8 Maintenance Operating Procedures [Go to Page]
- 8.1 Introduction [Go to Page]
- 8.1.1 BICSI Class Definition and Maintenance Procedures
- 8.1.2 Maintenance Activities and Risk
- Figure 8-1 Risk During Normal vs Maintenance Modes
- 8.2 Maintenance Document Library [Go to Page]
- 8.2.1 Introduction
- 8.2.2 Documentation
- 8.2.3 Maintenance Record Keeping
- 8.3 Maintenance Management [Go to Page]
- 8.3.1 Introduction
- 8.3.2 Maintenance Types
- Figure 8-2 Example of Measurements Points for Vibrational Testing
- 8.4 Equipment Maintenance Plan [Go to Page]
- 8.4.1 Introduction
- 8.4.2 Maintenance Tasks for EMPs
- 8.4.3 EMP Elements
- 8.5 Maintenance Contracts [Go to Page]
- 8.5.1 Introduction
- 8.5.2 Requirements
- 8.5.3 Recommendations
- 8.5.4 Maintenance Specification
- 8.6 Routine Patrols and Inspections
- 8.7 Power Systems [Go to Page]
- 8.7.1 Introduction
- 8.7.2 Requirements
- 8.7.3 General Recommendations
- 8.7.4 Grounding and Lightning Protection
- 8.7.5 Utility Input Switchgear
- 8.7.6 Distribution Systems
- 8.7.7 Mechanical Equipment Power Supply
- 8.7.8 Control Systems
- 8.7.9 Transfer Switches
- 8.7.10 UPS (Uninterruptable Power Supply)
- 8.7.11 Backup and Emergency Power Systems
- 8.8 ITE Moves, Adds and Changes [Go to Page]
- 8.8.1 Equipment Maintenance Outages
- 8.9 Cooling Systems [Go to Page]
- 8.9.1 Introduction
- 8.9.2 Preventative Maintenance Program
- 8.9.3 Maintenance and Replacement of Components
- 8.10 Computer Room Airflow [Go to Page]
- 8.10.1 Introduction
- 8.10.2 Blanking Panels
- 8.10.3 Rail Blanking
- 8.10.4 Cable Access Holes
- 8.10.5 External Containment Functionality
- 8.10.6 Cable Hygiene
- 8.10.7 Access Floor System Maintenance
- 8.10.8 Floor Tile Placement
- 8.10.9 Room Sensors
- 8.10.10 Recommendations
- 8.11 Cabling Systems Maintenance [Go to Page]
- 8.11.1 Introduction
- 8.11.2 Recommendations
- 8.12 Building Systems [Go to Page]
- 8.12.1 Fire Detection, Suppression and Notification
- 8.12.2 Monitoring and Management Systems
- 8.12.3 Physical Security and Access Control
- 8.13 Area and Physical Space Maintenance
- 8.14 Spare Parts and Consumables [Go to Page]
- 8.14.1 Consideration
- 8.14.2 Management of Spares and Spare Parts
- 8.15 IT Network and Telecommunication Systems
- 9 Emergency Operating Procedures [Go to Page]
- 9.1 Introduction
- 9.2 Response Documentation
- 9.3 Internal Data Center Events [Go to Page]
- 9.3.1 Equipment Failures
- 9.3.2 Critical Services Failures
- 9.3.3 Operational Troubles
- 9.4 On-Site Events [Go to Page]
- 9.4.1 Initial Event Response
- 9.4.2 Upon Event Resolution
- 9.5 Offsite Events [Go to Page]
- 9.5.1 Initial Event Response
- 9.5.2 Upon Event Resolution
- 9.6 Emergency Response to Natural Disasters [Go to Page]
- 9.6.1 Initial Event Response
- 9.6.2 Upon Event Resolution
- 9.7 Emergency Response to Physical Security Breach
- 9.8 Emergency Response to Personal Injury [Go to Page]
- 9.8.1 Initial Event Response
- 9.9 Disaster Recovery [Go to Page]
- 9.9.1 Introduction
- 9.9.2 Plan
- 9.9.3 Personnel
- 9.9.4 Essential Disaster Recovery Components
- 9.9.5 Testing of Disaster Recovery Plans
- 9.9.6 Chemical, Biological, Radiological, Nuclear and Explosives
- 10 Management [Go to Page]
- 10.1 Operations Management Overview [Go to Page]
- 10.1.1 Service Operations
- 10.1.2 Service Desk
- 10.1.3 IT Service Management (ITSM)
- 10.1.4 IT Operations Management
- 10.1.5 Technical Management
- 10.1.6 Application Management
- 10.1.7 IT Security Management
- 10.1.8 Management of Facility Operations
- 10.2 Management Tools [Go to Page]
- 10.2.1 Overview
- 10.2.2 DCIM
- Figure 10-1 DCIM System Outline Configuration
- 10.2.3 Infrastructure Asset Management
- 10.2.4 Configuration Management Data Base
- Figure 10-2 Configuration Management Data Base (CMDB) Model
- 10.2.5 Building Management Systems (BMS)
- 10.2.6 Automated Infrastructure Management (AIM) Systems
- 10.3 Operational Management Modules [Go to Page]
- 10.3.1 Introduction
- 10.3.2 Asset Management Module
- 10.3.3 Network Discovery Module
- 10.3.4 Connectivity Management Module
- 10.3.5 Power Management Module
- 10.3.6 Capacity Planning Module
- 10.3.7 Dashboard Module
- 10.3.8 Workflow Module
- 10.3.9 End-to-End Resource Management
- 10.4 Service Provider Management [Go to Page]
- 10.4.1 Introduction
- 10.4.2 Cloud Service Models
- Figure 10-3 Data Center Ownership Models
- 10.4.3 Cloud Installation Models
- 10.4.4 Cloud Considerations
- 10.5 Metrics and Measurement [Go to Page]
- 10.5.1 Introduction
- Figure 10-4 Data Center Metrics
- 10.6 Change Management, Change Control, and Documentation [Go to Page]
- 10.6.1 Introduction
- 10.6.2 Scope
- 10.6.3 Requirements for Change Management Procedures
- 10.6.4 Types of Changes in a Data Center
- 10.6.5 Risk Classifications
- 10.6.6 Change Review Board (CRB)
- 10.7 Data Center Security [Go to Page]
- 10.7.1 Hardware Security Technologies
- 10.7.2 Firmware Security Technologies
- 10.7.3 Virtualization Security Technologies
- 10.7.4 Other Security Technologies
- 10.8 Operations Organizational Structure [Go to Page]
- 10.8.1 Introduction
- 10.9 Training [Go to Page]
- 10.9.1 Facility Systems
- Appendix A Related Documents (Informative)
- Blank Page [Go to Page]