2044997
2044997
2044997
BICSI international standards contain information deemed to be of technical value to the industry and are published at
the request of the originating committee. The BICSI International Standards Program subjects all of its draft standards
to a rigorous public review and comment resolution process, which is a part of the full development and approval
process for any BICSI international standard.
The BICSI International Standards Program reviews its standards at regular intervals. By the end of the fifth year after
a standard’s publication, the standard will be reaffirmed, rescinded, or revised according to the submitted updates and
comments from all interested parties.
Suggestions for revision should be directed to the BICSI International Standards Program, care of BICSI.
Copyright
This BICSI document is a standard and is copyright protected. Except as permitted under the applicable laws of the
user's country, neither this BICSI standard nor any extract from it may be reproduced, stored in a retrieval system or
transmitted in any form or by any means, electronic, photocopying, recording, or otherwise, without prior written
permission from BICSI being secured.
Published by:
BICSI
8610 Hidden River Parkway
Tampa, FL 33637-1000 USA
i
BICSI 009-2019
BICSI standards and publications are designed to serve the public interest by offering information communication and
technology systems design guidelines and best practices. Existence of such standards and publications shall not in any
respect preclude any member or nonmember of BICSI from manufacturing or selling products not conforming to such
standards and publications, nor shall the existence of such standards and publications preclude their voluntary use,
whether the standard is to be used either domestically or internationally.
By publication of this standard, BICSI takes no position respecting the validity of any patent rights or copyrights
asserted in connection with any item mentioned in this standard. Additionally, BICSI does not assume any liability to
any patent owner, nor does it assume any obligation whatever to parties adopting the standard or publication. Users of
this standard are expressly advised that determination of any such patent rights or copyrights, and the risk of
infringement of such rights, are entirely their own responsibility.
This standard does not purport to address all safety issues or applicable regulatory requirements associated with its use.
It is the responsibility of the user of this standard to review any existing codes and other regulations recognized by the
national, regional, local, and other recognized authorities having jurisdiction (AHJ) in conjunction with the use of this
standard. Where differences occur, those items listed within the codes or regulations of the AHJ supersede any
requirement or recommendation of this standard.
All warranties, express or implied, are disclaimed, including without limitation, any and all warranties concerning the
accuracy of the contents, its fitness or appropriateness for a particular purpose or use, its merchantability and its non-
infringement of any third-party’s intellectual property rights. BICSI expressly disclaims any and all responsibilities for
the accuracy of the contents and makes no representations or warranties regarding the content’s compliance with any
applicable statute, rule, or regulation.
BICSI shall not be liable for any and all damages, direct or indirect, arising from or relating to any use of the contents
contained herein, including without limitation any and all indirect, special, incidental, or consequential damages
(including damages for loss of business, loss of profits, litigation, or the like), whether based upon breach of contract,
breach of warranty, tort (including negligence), product liability or otherwise, even if advised of the possibility of such
damages. The foregoing negation of damages is a fundamental element of the use of the contents hereof, and these
contents would not be published by BICSI without such limitations.
ii
Data Center Operations and Maintenance Best Practices
TABLE OF CONTENTS
PREFACE ........................................................................................................................................ xi
1 Introduction ..................................................................................................................................... 1
1.1 General ............................................................................................................................................................ 1
1.2 Purpose ............................................................................................................................................................ 1
1.2.1 ICT Operations ........................................................................................................................................... 1
1.2.2 Facilities Operations ................................................................................................................................... 2
1.2.3 Data Center Management ........................................................................................................................... 2
1.3 Impact of Redundancy on Operations and Maintenance Procedures ....................................................... 2
1.3.1 Standard Operating Procedures .................................................................................................................. 3
1.3.2 Maintenance Operating Procedures ............................................................................................................ 3
1.3.3 Emergency Operating Procedures .............................................................................................................. 3
1.4 Categories of Criteria..................................................................................................................................... 3
2 Scope ........................................................................................................................................... 5
iii
BICSI 009-2019
7 Security ..........................................................................................................................................45
7.1 Introduction .................................................................................................................................................. 45
7.2 Risk and Threat Assessment ........................................................................................................................ 46
7.3 Regulatory and Insurance Considerations ................................................................................................. 46
7.3.1 Introduction ............................................................................................................................................... 46
7.3.2 Regulations or Laws Affecting Security ................................................................................................... 46
7.4 Data Center Security Plan ........................................................................................................................... 47
7.4.1 Introduction ............................................................................................................................................... 47
7.4.2 General Recommendations ....................................................................................................................... 47
7.4.3 Physical Security Plan............................................................................................................................... 47
7.4.1 Cyber/IT Security Plan ............................................................................................................................. 48
7.5 Physical Security Systems ............................................................................................................................ 49
7.5.1 Access Control .......................................................................................................................................... 49
7.5.2 Badging and Identification ........................................................................................................................ 53
7.5.3 Signage and Display Policy and Procedures ............................................................................................. 54
7.5.4 Fire Prevention, Detection and Suppression ............................................................................................. 54
7.5.5 Video Surveillance .................................................................................................................................... 54
7.5.6 Monitoring and Alarms ............................................................................................................................. 54
iv
Data Center Operations and Maintenance Best Practices
v
BICSI 009-2019
vi
Data Center Operations and Maintenance Best Practices
10 Management .................................................................................................................................. 99
10.1 Operations Management Overview ............................................................................................................ 99
10.1.1 Service Operations .................................................................................................................................... 99
10.1.2 Service Desk ........................................................................................................................................... 100
10.1.3 IT Service Management (ITSM) ............................................................................................................ 101
10.1.4 IT Operations Management .................................................................................................................... 102
10.1.5 Technical Management ........................................................................................................................... 103
10.1.6 Application Management........................................................................................................................ 103
10.1.7 IT Security Management ........................................................................................................................ 104
10.1.8 Management of Facility Operations ....................................................................................................... 104
10.2 Management Tools ..................................................................................................................................... 105
10.2.1 Overview ................................................................................................................................................ 105
10.2.2 DCIM...................................................................................................................................................... 105
10.2.3 Infrastructure Asset Management ........................................................................................................... 113
10.2.4 Configuration Management Data Base ................................................................................................... 114
10.2.5 Building Management Systems (BMS) .................................................................................................. 116
10.2.6 Automated Infrastructure Management (AIM) Systems ........................................................................ 117
10.3 Operational Management Modules .......................................................................................................... 119
10.3.1 Introduction ............................................................................................................................................ 119
10.3.2 Asset Management Module .................................................................................................................... 119
10.3.3 Network Discovery Module ................................................................................................................... 120
10.3.4 Connectivity Management Module ........................................................................................................ 120
10.3.5 Power Management Module ................................................................................................................... 120
10.3.6 Capacity Planning Module ..................................................................................................................... 121
10.3.7 Dashboard Module ................................................................................................................................. 122
10.3.8 Workflow Module .................................................................................................................................. 123
10.3.9 End-to-End Resource Management ........................................................................................................ 123
10.4 Service Provider Management .................................................................................................................. 123
10.4.1 Introduction ............................................................................................................................................ 123
10.4.2 Cloud Service Models ............................................................................................................................ 123
10.4.3 Cloud Installation Models....................................................................................................................... 124
10.4.4 Cloud Considerations ............................................................................................................................. 124
10.5 Metrics and Measurement ......................................................................................................................... 125
10.5.1 Introduction ............................................................................................................................................ 125
vii
BICSI 009-2019
viii
Data Center Operations and Maintenance Best Practices
INDEX OF FIGURES
Section 7 Security
Figure 7-1 Security Measures ...........................................................................................................................45
Figure 7-2 Levels of Access Control ................................................................................................................50
Figure 7-3 Example of a Visually Distinctive Expired Badge ..........................................................................54
Section 10 Management
Figure 10-1 DCIM System Outline Configuration ...........................................................................................107
Figure 10-2 Configuration Management Data Base (CMDB) Model ...............................................................115
Figure 10-3 Data Center Ownership Models ....................................................................................................124
Figure 10-4 Data Center Metrics ......................................................................................................................125
ix
BICSI 009-2019
x
Data Center Operations and Maintenance Best Practices
PREFACE
Revision History
May 1, 2019 First publication of this standard, titled BICSI 009-2019, Data Center Operations and
Maintenance Best Practices
Translation Notice
This standard may have one or more translations available as a reference for the convenience of its readers. As that act
of translation may contain inconsistencies with the original text, if differences between the translation and the published
English version exist, the English text shall be used as the official and authoritative version.
xi
BICSI 009-2019
xii
Data Center Operations and Maintenance Best Practices
1 Introduction
1.1 General
This standard is written with the expectation that the reader is familiar with the different facets of operating and
maintaining data center IT systems and supporting facility systems. The reader should understand from which role and
point of view he or she intends to use this document (e.g., information technology, facilities, other corporate internal or
external to the owner). Refer to Sections 1.2.1 –1.2.3 below.
1.2 Purpose
This standard provides a reference of common terminology and operating practices. It is not intended to be used by
managers, administrators or technicians as their sole reference or as a step-by-step operations guide, but may be used
by such persons to determine operation requirements in conjunction with the data center owner, management,
administrators, technicians, and in the case of data center outsourcing vendors - customers.
This standard is intended primarily for:
• Data center owners
• Data center management
• Data center operations
• Project managers
• Information and communications technology (ICT) project managers, technicians and system administrators
Additionally, individuals in the following groups are also served by this standard.
1.2.1 ICT Operations
1.2.1.1 ICT Representatives
ICT operations that may use BICSI 009 to develop policies and procedures include:
• Application developers
• Server, storage and network system administrators
• Network Security
• ICT network cabling technicians
• Network operations center (NOC) technicians
• Rack & stack technicians
• IT service desk support and knowledge management
• Change management
• Project management
• Risk management
1.2.1.2 ICT Groups
Each of the ICT representatives listed above may work within one or more of the following areas of responsibility:
• Planning and design
• Intake and transition
• Release management
• Change management
• General operations
• Risk management
ICT operations should coordinate policies and procedures with Facility operations to ensure the policies and procedures
of one discipline does not introduce unnecessary risk on the data center operations.