As I briefly mentioned in my last guest column, one of the keys to a secure data center is understanding what “normal” looks like within your environment. Doing so makes it is possible to recognize abnormalities that may indicate a security breach. This baselining process should be part of a robust security policy that improves your team’s ability to build and execute on a predetermined response plan when deviation is detected.
There are several ways to develop such baselines, but one of the tools that is often overlooked is the data center monitoring system you probably already have in place. Combined with security-specific tools and a disciplined approach, monitoring should be key in a comprehensive defense in-depth approach.