This can put a strain in our power management components and may result in a security incident, not necessarily related to a malicious attack. Power loss and other electrical threats become a big issue, knowing how we are consolidating devices, servers, and applications in data centers and trying to scale up to the number of connections and number of users that we want to serve. For example, it is a lot more likely to do poor handling of key electrical components in a modular device switch or router that requires installation of modules, installation of blades, and network cards to either expand its functionality or add more horsepower.
We have had threats to physical installations since the dawn of networking however, these threats are augmented by some of the technology transit we see now a days. Risk is based on the probability of threats exploiting assets with certain vulnerabilities. Information security policies should be based on risk analysis and risk management.
We will start with physical security, followed by basic controls like implementing a password strategy, sign posting via login banners, and the use of SSH for improved and confidential configuration management.