Shopping Cart

No products in the cart.

BICSI 009 2019

$127.29

BICSI 009-2019, Data Center Operations and Maintenance Best Practices

Published By Publication Date Number of Pages
BICSI 2019
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

Data centers come in all sizes and serve a variety of users, applications, and services. While the design of data centers can mitigate many risks to uptime, even the best design can be foiled by lax or inadequate care in operations. Introducing BICSI 009-2019, the first open-consensus standard providing more than a framework for data center operation policies and practices. Developed by a global volunteer base, the material within reflects operational experience and lessons from a wide variety of data center owners, operators, designers, and consultants covering data centers from the small enterprise to the large hyperscale colocation data center and everything in-between. Starting with the applicable operational material from BICSI 002-2019, BICSI 009 revised and expanded this content prior to developing additional content specific for data center owners, operators and managers. Highlights As the foundation standard for data center operations, BICSI 009 features 10 chapters covering the following and more: Governance Standard operating procedures ICT cut-overs, technology refresh and migration Work orders Work safety Storage, staging, and related tasks Equipment delivery and shipments Security Security plan Physical, cyber & IT security Material control and loss prevention Computer room and critical facility areas special considerations Event response Maintenance Management Maintenance plans and contracts Patrols and inspections ITE moves, adds and changes Power, cooling, and cabling systems Building area and physical space maintenance Emergency operating procedures On-site and offsite events Emergency response Disaster recovery Management Operations management Management tools (e.g., DCIM, BMS, AIM) Service provider management Change control and documentation

PDF Catalog

PDF Pages PDF Title
3 Blank Page
4 BICSI International Standards
6 TABLE OF CONTENTS
12 INDEX OF FIGURES
16 1 Introduction
1.1 General
1.2 Purpose
1.2.1 ICT Operations
17 1.2.2 Facilities Operations
1.2.3 Data Center Management
1.3 Impact of Redundancy on Operations and Maintenance Procedures
18 1.3.1 Standard Operating Procedures
1.3.2 Maintenance Operating Procedures
1.3.3 Emergency Operating Procedures
1.4 Categories of Criteria
20 2 Scope
22 3 Required Standards and Documents
24 4 Definitions, Acronyms, Abbreviations, and Units of Measurement
4.1 Definitions
31 4.2 Acronyms and Abbreviations
4.3 Units of Measurement
32 5 Governance and Assessment
5.1 Introduction
5.1.1 Public Governance
5.1.2 Private Governance
5.2 Compliance
33 5.2.1 Documentation
5.3 Voluntary Assessment Programs
5.3.1 Overview
5.4 Types of Assessments
5.4.1 Introduction
5.4.2 Risk Assessment
34 5.4.3 Data Center Operations and Maintenance Assessment
5.4.4 Security Assessment
36 6 Standard Operating Procedures
6.1 Introduction
6.2 BICSI Class Definition and Standard Operating Procedures
6.3 ICT Cut-overs, Technology Refresh and Migration
6.3.1 Cut-Overs
6.3.2 Change Control Process
37 6.4 Work Orders
6.4.1 Introduction
6.4.2 Data Center Installation Work Order
39 6.4.3 Example of a Data Center Work Order Process for ITE
40 6.5 Work Safety
6.5.1 Scope
6.5.2 Safety Planning
41 6.5.3 Safety Meetings and Briefings
42 6.5.4 Emergencies
43 6.5.5 Electrical Safety
44 Figure 6-1 Example of a LOTO Electrical Safety Form
45 Figure 6-2 Example of a LOTO Justification Form
6.5.6 Mechanical Safety
46 6.5.7 Personal Protective Equipment (PPE)
48 6.5.8 Work Place Safety Training
50 Figure 6-3 Example LOTO Custody of Equipment Flow Chart
51 6.5.9 Accident Reporting
52 Figure 6-4 Example of an Accident / Incident Reporting Form
53 6.6 Storage, Staging, and Related Tasks
6.6.1 Storage
6.6.2 Staging
6.6.3 Packing and Unpacking
6.6.4 Manufacturer Testing
6.6.5 End User Burn-In
6.7 Interface with Data Center Users
6.7.1 Data Center Service
55 6.7.2 Correspondences (Interface procedures)
56 6.7.3 Facility Operations
6.7.4 Facility Reports
57 6.7.5 Periodical Meetings
58 6.7.6 External Personnel Access
6.8 Equipment Delivery and Shipments
6.8.1 Materials Management
6.8.2 Procurement Processes
6.8.3 Shipping Considerations
59 6.8.4 Receiving Materials
6.8.5 Handling Hazardous Materials
60 7 Security
7.1 Introduction
Figure 7-1 Security Measures
61 7.2 Risk and Threat Assessment
7.3 Regulatory and Insurance Considerations
7.3.1 Introduction
7.3.2 Regulations or Laws Affecting Security
62 7.4 Data Center Security Plan
7.4.1 Introduction
7.4.2 General Recommendations
7.4.3 Physical Security Plan
63 7.4.1 Cyber/IT Security Plan
64 7.5 Physical Security Systems
7.5.1 Access Control
65 Figure 7-2 Levels of Access Control
68 7.5.2 Badging and Identification
69 7.5.3 Signage and Display Policy and Procedures
7.5.4 Fire Prevention, Detection and Suppression
Figure 7-3 Example of a Visually Distinctive Expired Badge
7.5.5 Video Surveillance
7.5.6 Monitoring and Alarms
70 7.6 Material Control and Loss Prevention
7.6.1 Introduction
7.6.2 Recommendations
71 7.6.3 Classification and Confidentiality of Sensitive Resources
7.6.4 Hazardous Material Storage
7.6.5 Disposal of Media and Printed Material
7.6.6 Theft
7.7 Data Center Personnel
7.7.1 Introduction
72 7.7.2 Hiring of Personnel
7.7.3 Reporting
7.7.4 Terminations of Personnel
73 7.8 Building Site
7.8.1 Site Access and Egress
7.8.2 Security Guards
74 7.8.3 Office Areas
7.9 Assessments
7.10 Computer Room and Critical Facility Areas Special Considerations
7.10.1 Requirements
7.10.2 Recommendations
75 7.11 Cyber/IT Security Policy and Procedures
7.11.1 Introduction
7.11.2 Passwords
7.11.3 Information Control
7.12 Event Response
7.12.1 Physical Security
76 7.12.2 Cyber/IT Security Event Response
7.12.3 Post-Mortem Processes and Policies 
78 8 Maintenance Operating Procedures
8.1 Introduction
8.1.1 BICSI Class Definition and Maintenance Procedures
8.1.2 Maintenance Activities and Risk
79 Figure 8-1 Risk During Normal vs Maintenance Modes
8.2 Maintenance Document Library
8.2.1 Introduction
8.2.2 Documentation
80 8.2.3 Maintenance Record Keeping
8.3 Maintenance Management
8.3.1 Introduction
8.3.2 Maintenance Types
83 Figure 8-2 Example of Measurements Points for Vibrational Testing
8.4 Equipment Maintenance Plan
8.4.1 Introduction
84 8.4.2 Maintenance Tasks for EMPs
8.4.3 EMP Elements
85 8.5 Maintenance Contracts
8.5.1 Introduction
8.5.2 Requirements
8.5.3 Recommendations
86 8.5.4 Maintenance Specification
87 8.6 Routine Patrols and Inspections
8.7 Power Systems
8.7.1 Introduction
8.7.2 Requirements
88 8.7.3 General Recommendations
8.7.4 Grounding and Lightning Protection
89 8.7.5 Utility Input Switchgear
8.7.6 Distribution Systems
8.7.7 Mechanical Equipment Power Supply
8.7.8 Control Systems
8.7.9 Transfer Switches
90 8.7.10 UPS (Uninterruptable Power Supply)
91 8.7.11 Backup and Emergency Power Systems
92 8.8 ITE Moves, Adds and Changes
8.8.1 Equipment Maintenance Outages
93 8.9 Cooling Systems
8.9.1 Introduction
94 8.9.2 Preventative Maintenance Program
95 8.9.3 Maintenance and Replacement of Components
99 8.10 Computer Room Airflow
8.10.1 Introduction
8.10.2 Blanking Panels
8.10.3 Rail Blanking
8.10.4 Cable Access Holes
100 8.10.5 External Containment Functionality
8.10.6 Cable Hygiene
8.10.7 Access Floor System Maintenance
101 8.10.8 Floor Tile Placement
8.10.9 Room Sensors
8.10.10 Recommendations
8.11 Cabling Systems Maintenance
8.11.1 Introduction
102 8.11.2 Recommendations
8.12 Building Systems
8.12.1 Fire Detection, Suppression and Notification
103 8.12.2 Monitoring and Management Systems
8.12.3 Physical Security and Access Control
104 8.13 Area and Physical Space Maintenance
8.14 Spare Parts and Consumables
8.14.1 Consideration
105 8.14.2 Management of Spares and Spare Parts
8.15 IT Network and Telecommunication Systems
106 9 Emergency Operating Procedures
9.1 Introduction
9.2 Response Documentation
9.3 Internal Data Center Events
9.3.1 Equipment Failures
107 9.3.2 Critical Services Failures
9.3.3 Operational Troubles
108 9.4 On-Site Events
9.4.1 Initial Event Response
109 9.4.2 Upon Event Resolution
9.5 Offsite Events
9.5.1 Initial Event Response
9.5.2 Upon Event Resolution
110 9.6 Emergency Response to Natural Disasters
9.6.1 Initial Event Response
9.6.2 Upon Event Resolution
9.7 Emergency Response to Physical Security Breach
111 9.8 Emergency Response to Personal Injury
9.8.1 Initial Event Response
9.9 Disaster Recovery
9.9.1 Introduction
9.9.2 Plan
112 9.9.3 Personnel
9.9.4 Essential Disaster Recovery Components
113 9.9.5 Testing of Disaster Recovery Plans
9.9.6 Chemical, Biological, Radiological, Nuclear and Explosives
114 10 Management
10.1 Operations Management Overview
10.1.1 Service Operations
115 10.1.2 Service Desk
116 10.1.3 IT Service Management (ITSM)
117 10.1.4 IT Operations Management
118 10.1.5 Technical Management
10.1.6 Application Management
119 10.1.7 IT Security Management
10.1.8 Management of Facility Operations
120 10.2 Management Tools
10.2.1 Overview
10.2.2 DCIM
122 Figure 10-1 DCIM System Outline Configuration
128 10.2.3 Infrastructure Asset Management
129 10.2.4 Configuration Management Data Base
130 Figure 10-2 Configuration Management Data Base (CMDB) Model
131 10.2.5 Building Management Systems (BMS)
132 10.2.6 Automated Infrastructure Management (AIM) Systems
134 10.3 Operational Management Modules
10.3.1 Introduction
10.3.2 Asset Management Module
135 10.3.3 Network Discovery Module
10.3.4 Connectivity Management Module
10.3.5 Power Management Module
136 10.3.6 Capacity Planning Module
137 10.3.7 Dashboard Module
138 10.3.8 Workflow Module
10.3.9 End-to-End Resource Management
10.4 Service Provider Management
10.4.1 Introduction
10.4.2 Cloud Service Models
139 Figure 10-3 Data Center Ownership Models
10.4.3 Cloud Installation Models
10.4.4 Cloud Considerations
140 10.5 Metrics and Measurement
10.5.1 Introduction
Figure 10-4 Data Center Metrics
141 10.6 Change Management, Change Control, and Documentation
10.6.1 Introduction
142 10.6.2 Scope
10.6.3 Requirements for Change Management Procedures
143 10.6.4 Types of Changes in a Data Center
10.6.5 Risk Classifications
144 10.6.6 Change Review Board (CRB)
10.7 Data Center Security
145 10.7.1 Hardware Security Technologies
10.7.2 Firmware Security Technologies
10.7.3 Virtualization Security Technologies
10.7.4 Other Security Technologies
146 10.8 Operations Organizational Structure
10.8.1 Introduction
147 10.9 Training
10.9.1 Facility Systems
150 Appendix A Related Documents (Informative)
BICSI 009 2019
$127.29