Apple M8889LL/A User Guide - Page 22

codes that will allow others to manage servers over the network. Keep the plan updated

Page 22 highlights

Security Whatever the location of the server and rack, it should be secure. m Determine that the rack's location is secure and that only authorized staff members or technicians can gain access to this site. m If using a server cabinet that is not stored in a secure room, be sure that the cabinet has adequate locking and that access to it is limited to authorized staff. m Develop a plan for distributing and controlling keys to the server environment and access codes that will allow others to manage servers over the network. Keep the plan updated with names of key staff and relevant emergency information and procedures. m Store a copy of essential server access information in a safe location away from the server site. 22 Chapter 2

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78

22
Chapter
2
Security
Whatever the location of the server and rack, it should be secure.
m
Determine that the rack’s location is secure and that only authorized staff members or
technicians can gain access to this site.
m
If using a server cabinet that is not stored in a secure room, be sure that the cabinet has
adequate locking and that access to it is limited to authorized staff.
m
Develop a plan for distributing and controlling keys to the server environment and access
codes that will allow others to manage servers over the network. Keep the plan updated
with names of key staff and relevant emergency information and procedures.
m
Store a copy of essential server access information in a safe location away from the
server site.