SlideShare a Scribd company logo
1 of 22
TÜV Informationstechnik GmbH  Member of TÜV NORD Group TSI: Trusted Site Infrastructure The certification program for data center - more than availability health checks
AGENDA Certification Process TSI Criteria TSI Certification Benefits Introduction to TUV Cost
TÜV´s in Germany TÜV Rheinland / Berlin-Brandenburg TÜV Süddeutschland TÜV Rheinland / Berlin-Brandenburg TÜV Saarland
TÜV NORD Group
TÜV NORD in Europe Grandvilliers Croydon Best Essen Madrid Mailand Athen Istanbul Katowice Prag Bratislava Novi Sad Slavonski Brod Moskau Plovdiv Tallin Kolding Hannover Hamburg Espoo Bologna Riga Wilna Bukarest Göteborg Ankara Donezk Budapest
TÜV NORD worldwide San José Clifton Buenos Aires Rio de Janeiro Dammam Abu Dhabi Teheran Mumbai Barat Bangkok Shanghai Hong Kong Tokyo Seoul Taipeh Almaty
Qualified personnel provide the basis  for high-level services 70% of all employees work in the technical domain. More than 2/3 of these are graduate engineers, and the rest are master craftsmen or technicians ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TÜViT  Our Principles TÜViT  -  The Trust Provider for  Quality  and  Security  in Information Technology works TÜViT  is a private company and does not develop, sell or integrate any products ! Manufacturers ,[object Object],[object Object],[object Object],Special interest groups Branches S hare holders/members Government Independent from unbiased impartial
TÜViT  Our Vision in the field of Information Technology and Telecommunication
Quality  And Security IT and Telecom-munication IT and Telecom-munication IT and Telecom-munication TÜVit  Our Mission
TÜViT   Topics Company Systems Components Project
Information Technology on all Layers Company Systems Components Project Evaluation of IT Security Optimization of IT Quality Privacy Security Management Quality Management Service Management Physical Security Network Security Secure e-Business Usability   Content Quality Monitoring Reliability Document Management Evaluation of Security Software Security Hardware Functional Tests Improvement of Processes Models Project Management
Information Technology Methods Company Systems Components Project IT Security IT Quality quid! / ULD ISO 27001 / ISO 17799 GSM SAS / TU4 Baseline Protection ISO 9000 ITIL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CMMI  SPICE V-Model  RUP IEEE 1233 ISO 12119 ISO 9241 Common Criteria / ITSEC FIPS 140 ZKA-Criteria Trust Site Hardware Laboratory
IT-Security Accreditations Company Systems Components Project ISO 17799 / BS7799-2 GSM SAS / TU.4 quid! / ULD Baseline Protection Common Criteria / ITSEC FIPS 140-1/-2 ZKA-Criteria Trusted Site Check of CA’s acc. SigG - Infrastructure - Security Qualification (SQ) ® - Privacy
IT-Security Knowledge Company Systems Components Project ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ISO 27001 / ISO 17799 GSM SAS / TU.4 quid! / ULD Baseline Protection Trusted Site Check of CA’s acc. SigG - Infrastructure - Security Qualification (SQ) ® - Privacy Common Criteria / ITSEC FIPS 140 ZKA-Criteria
Trusted site infrastructure Trusted site  infrastructure for  Data Center
Trusted site infrastructure Functional security based on three columns Informational technical Organizational Physical FUNCTIONAL SECURITY
Trusted site infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],風險來源
Trusted site infrastructure Environment Criteria, e.g.  ( 地理環境) The building surrounds the information technology which has been installed and offers external protection. The location of the building plays a role with regard to the surrounding hazard potentials, as does the actual position of the security area within the building. If these factors are taken into consideration, potential sources of hazard can be prevented from the very beginning. Environmental hazards originating from water, explosions, ruins and debris, vibration and shaking and hazardous substances should definitely be avoided. In the same way, traffic routes which carry hazardous substances should be avoided, in order to prevent possible direct negative effects and also indirect effects, such as for example blocked access. 資料機房的座落地點: 水災,爆炸,暴動,震動,危險物質,交通狀況 Environment Criteria
 
Structural aspects e.g.  ( 建築結構) Trusted site infrastructure Walls (VdS 2334), windows and doors must offer protection against unauthorized access (DIN V ENV 1627) and fire and smoke (DIN 18095). In the same way, it must be ensured that no sections of the building are under threat from water (VdS 2007), EM/RF interference fields (EN 50147 Part 1) or close proximity to dangerous production processes. The building must be provided with external protection against lightning strike (DIN VDE 0185 Part 3) and must allow the security area to be located in a separate fire protection area (DIN 4102). The supply lines have to be laid in protective structures. EN 1047-2 specifies that in order to ensure the functioning of the IT systems and the data media in case of fire, the items requiring protection may only be exposed to defined maximum temperature and humidity limits. 資料機房的座落地點:防盜,防火,雷擊,溫濕度承受度 Structural aspects
 

More Related Content

What's hot

Cyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixCyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixTheAnfieldGroup
 
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...PECB
 
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Mike Boudreaux
 
35958867 safety-instrumented-systems
35958867 safety-instrumented-systems35958867 safety-instrumented-systems
35958867 safety-instrumented-systemsMowaten Masry
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
IEC 61511 introduction
IEC 61511 introduction IEC 61511 introduction
IEC 61511 introduction KoenLeekens
 
Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation Living Online
 
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...John Kingsley
 
Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013APEXMarCom
 
VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC Leonard Watson
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver NarrTI Safe
 
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_short
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_shortSicurezza Industrie4.0 - E M Tieghi templ Assintel_short
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_shortEnzo M. Tieghi
 
Safety instrumented systems angela summers
Safety instrumented systems angela summers Safety instrumented systems angela summers
Safety instrumented systems angela summers Ahmed Gamal
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01RoutecoMarketing
 
Cost Effective Outcomes from FPSO Safety Case
Cost Effective Outcomes from FPSO Safety CaseCost Effective Outcomes from FPSO Safety Case
Cost Effective Outcomes from FPSO Safety CaseIQPC
 
Guide to industrial control systems (ics) security
Guide to industrial control systems (ics) securityGuide to industrial control systems (ics) security
Guide to industrial control systems (ics) securityericv83
 
High Security Group Presentation 6.10.08
High Security Group Presentation 6.10.08High Security Group Presentation 6.10.08
High Security Group Presentation 6.10.08Richard Holmes
 
IEC 62061 introduction
IEC 62061 introductionIEC 62061 introduction
IEC 62061 introductionKoenLeekens
 

What's hot (20)

Cyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixCyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott Mix
 
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
 
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
 
35958867 safety-instrumented-systems
35958867 safety-instrumented-systems35958867 safety-instrumented-systems
35958867 safety-instrumented-systems
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
IEC 61511 introduction
IEC 61511 introduction IEC 61511 introduction
IEC 61511 introduction
 
Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation
 
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
 
Understanding sil
Understanding silUnderstanding sil
Understanding sil
 
Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013
 
VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_short
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_shortSicurezza Industrie4.0 - E M Tieghi templ Assintel_short
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_short
 
Safety instrumented systems angela summers
Safety instrumented systems angela summers Safety instrumented systems angela summers
Safety instrumented systems angela summers
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
 
Cost Effective Outcomes from FPSO Safety Case
Cost Effective Outcomes from FPSO Safety CaseCost Effective Outcomes from FPSO Safety Case
Cost Effective Outcomes from FPSO Safety Case
 
Guide to industrial control systems (ics) security
Guide to industrial control systems (ics) securityGuide to industrial control systems (ics) security
Guide to industrial control systems (ics) security
 
High Security Group Presentation 6.10.08
High Security Group Presentation 6.10.08High Security Group Presentation 6.10.08
High Security Group Presentation 6.10.08
 
IEC 62061 introduction
IEC 62061 introductionIEC 62061 introduction
IEC 62061 introduction
 
Juniper LN2600
Juniper LN2600Juniper LN2600
Juniper LN2600
 

Similar to TSI Certified Data Center

德國TSI公司簡報-2
德國TSI公司簡報-2德國TSI公司簡報-2
德國TSI公司簡報-2俠客科技
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationISA Boston Section
 
Kalyani technologies corporate presentation
Kalyani technologies corporate presentationKalyani technologies corporate presentation
Kalyani technologies corporate presentationKalyani Technologies
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn Kingsley
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academyananthakrishnansblit
 
Cyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochiCyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochiamallblitz0
 
Data and Power Isolation (Design Conference 2013)
Data and Power Isolation (Design Conference 2013)Data and Power Isolation (Design Conference 2013)
Data and Power Isolation (Design Conference 2013)Analog Devices, Inc.
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended Larry Vandenaweele
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systemsAlan Tatourian
 
secure-manager-introduction-v1.pdf
secure-manager-introduction-v1.pdfsecure-manager-introduction-v1.pdf
secure-manager-introduction-v1.pdfssuser64a562
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart ManufacturingCSA Group
 

Similar to TSI Certified Data Center (20)

德國TSI公司簡報-2
德國TSI公司簡報-2德國TSI公司簡報-2
德國TSI公司簡報-2
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
 
Kalyani technologies corporate presentation
Kalyani technologies corporate presentationKalyani technologies corporate presentation
Kalyani technologies corporate presentation
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
FSIPL1
FSIPL1FSIPL1
FSIPL1
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
Mynd company presentation
Mynd   company presentationMynd   company presentation
Mynd company presentation
 
Esguf Profile Short V34
Esguf Profile Short V34Esguf Profile Short V34
Esguf Profile Short V34
 
Linked In Presentation
Linked In PresentationLinked In Presentation
Linked In Presentation
 
TTTech Company Overview
TTTech Company OverviewTTTech Company Overview
TTTech Company Overview
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
 
Cyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochiCyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochi
 
Data and Power Isolation (Design Conference 2013)
Data and Power Isolation (Design Conference 2013)Data and Power Isolation (Design Conference 2013)
Data and Power Isolation (Design Conference 2013)
 
3DPrinting5MinGuide_Infographic
3DPrinting5MinGuide_Infographic3DPrinting5MinGuide_Infographic
3DPrinting5MinGuide_Infographic
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
How to get started in cybersecurity
How to get started in cybersecurityHow to get started in cybersecurity
How to get started in cybersecurity
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 
secure-manager-introduction-v1.pdf
secure-manager-introduction-v1.pdfsecure-manager-introduction-v1.pdf
secure-manager-introduction-v1.pdf
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart Manufacturing
 

More from 俠客科技 (17)

合作廠商
合作廠商合作廠商
合作廠商
 
愛酌客事業iDrink
愛酌客事業iDrink愛酌客事業iDrink
愛酌客事業iDrink
 
Swipy 處處收款
Swipy 處處收款Swipy 處處收款
Swipy 處處收款
 
資策會華文電子商務
資策會華文電子商務資策會華文電子商務
資策會華文電子商務
 
宏鑫生技簡報
宏鑫生技簡報宏鑫生技簡報
宏鑫生技簡報
 
About Suntech
About SuntechAbout Suntech
About Suntech
 
Kado
KadoKado
Kado
 
Format 1
Format 1Format 1
Format 1
 
Ppt Product
Ppt ProductPpt Product
Ppt Product
 
Ppt Institute
Ppt InstitutePpt Institute
Ppt Institute
 
Apl Paint2
Apl Paint2Apl Paint2
Apl Paint2
 
Stonehawkshaw
StonehawkshawStonehawkshaw
Stonehawkshaw
 
Sleepless
SleeplessSleepless
Sleepless
 
Apl Paint
Apl PaintApl Paint
Apl Paint
 
Tl Dog
Tl DogTl Dog
Tl Dog
 
Pdf Goalq
Pdf GoalqPdf Goalq
Pdf Goalq
 
Present
PresentPresent
Present
 

Recently uploaded

Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 

Recently uploaded (20)

Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 

TSI Certified Data Center

  • 1. TÜV Informationstechnik GmbH Member of TÜV NORD Group TSI: Trusted Site Infrastructure The certification program for data center - more than availability health checks
  • 2. AGENDA Certification Process TSI Criteria TSI Certification Benefits Introduction to TUV Cost
  • 3. TÜV´s in Germany TÜV Rheinland / Berlin-Brandenburg TÜV Süddeutschland TÜV Rheinland / Berlin-Brandenburg TÜV Saarland
  • 5. TÜV NORD in Europe Grandvilliers Croydon Best Essen Madrid Mailand Athen Istanbul Katowice Prag Bratislava Novi Sad Slavonski Brod Moskau Plovdiv Tallin Kolding Hannover Hamburg Espoo Bologna Riga Wilna Bukarest Göteborg Ankara Donezk Budapest
  • 6. TÜV NORD worldwide San José Clifton Buenos Aires Rio de Janeiro Dammam Abu Dhabi Teheran Mumbai Barat Bangkok Shanghai Hong Kong Tokyo Seoul Taipeh Almaty
  • 7.
  • 8.
  • 9. TÜViT Our Vision in the field of Information Technology and Telecommunication
  • 10. Quality And Security IT and Telecom-munication IT and Telecom-munication IT and Telecom-munication TÜVit Our Mission
  • 11. TÜViT Topics Company Systems Components Project
  • 12. Information Technology on all Layers Company Systems Components Project Evaluation of IT Security Optimization of IT Quality Privacy Security Management Quality Management Service Management Physical Security Network Security Secure e-Business Usability Content Quality Monitoring Reliability Document Management Evaluation of Security Software Security Hardware Functional Tests Improvement of Processes Models Project Management
  • 13.
  • 14. IT-Security Accreditations Company Systems Components Project ISO 17799 / BS7799-2 GSM SAS / TU.4 quid! / ULD Baseline Protection Common Criteria / ITSEC FIPS 140-1/-2 ZKA-Criteria Trusted Site Check of CA’s acc. SigG - Infrastructure - Security Qualification (SQ) ® - Privacy
  • 15.
  • 16. Trusted site infrastructure Trusted site infrastructure for Data Center
  • 17. Trusted site infrastructure Functional security based on three columns Informational technical Organizational Physical FUNCTIONAL SECURITY
  • 18.
  • 19. Trusted site infrastructure Environment Criteria, e.g. ( 地理環境) The building surrounds the information technology which has been installed and offers external protection. The location of the building plays a role with regard to the surrounding hazard potentials, as does the actual position of the security area within the building. If these factors are taken into consideration, potential sources of hazard can be prevented from the very beginning. Environmental hazards originating from water, explosions, ruins and debris, vibration and shaking and hazardous substances should definitely be avoided. In the same way, traffic routes which carry hazardous substances should be avoided, in order to prevent possible direct negative effects and also indirect effects, such as for example blocked access. 資料機房的座落地點: 水災,爆炸,暴動,震動,危險物質,交通狀況 Environment Criteria
  • 20.  
  • 21. Structural aspects e.g. ( 建築結構) Trusted site infrastructure Walls (VdS 2334), windows and doors must offer protection against unauthorized access (DIN V ENV 1627) and fire and smoke (DIN 18095). In the same way, it must be ensured that no sections of the building are under threat from water (VdS 2007), EM/RF interference fields (EN 50147 Part 1) or close proximity to dangerous production processes. The building must be provided with external protection against lightning strike (DIN VDE 0185 Part 3) and must allow the security area to be located in a separate fire protection area (DIN 4102). The supply lines have to be laid in protective structures. EN 1047-2 specifies that in order to ensure the functioning of the IT systems and the data media in case of fire, the items requiring protection may only be exposed to defined maximum temperature and humidity limits. 資料機房的座落地點:防盜,防火,雷擊,溫濕度承受度 Structural aspects
  • 22.