TL;DR
Your building is at serious risk. An unlocked server room means anyone could access critical systems and data. Immediately secure the room, assess what might have been compromised, and report the incident. Follow the steps below to minimise damage.
1. Immediate Physical Security
- Secure the Room: Lock the door immediately. If the existing lock is compromised, change it right now. Consider a more robust lock (e.g., deadbolt, access control system).
- Check for Signs of Entry: Look for any evidence someone has been inside – forced entry marks, moved items, opened equipment, etc. Take photos of anything suspicious.
- Control Access: Implement a strict access list. Only authorised personnel should have keys or access codes. Log all entries and exits (see Step 6).
2. Initial System Check
- Visual Inspection: Quickly check servers for obvious tampering – disconnected cables, open cases, unusual lights/sounds. Do not touch anything unless absolutely necessary to power down a system if you suspect immediate danger (e.g., overheating).
- Network Monitoring: Check your network monitoring tools for unusual activity. Look for:
- Unexpected logins
- Large data transfers
- New or unknown devices on the network
- Changes to firewall rules
3. Identify Potentially Compromised Systems
- Review Logs: Examine server logs, firewall logs, and intrusion detection system (IDS) logs for suspicious events around the time of the breach. Pay attention to failed login attempts, unusual processes, and network connections.
- Antivirus/Malware Scan: Run a full antivirus and malware scan on all servers in the room. Update your definitions first!
sudo apt update && sudo apt upgrade clamav(Example for Debian/Ubuntu)
- Check Backups: Verify the integrity of recent backups. Ensure they haven’t been tampered with or encrypted.
4. Data Breach Assessment
- Identify Sensitive Data: Determine what types of sensitive data are stored on the servers (e.g., customer information, financial records, intellectual property).
- Data Loss Prevention (DLP): If you have DLP systems, check for any alerts indicating data exfiltration.
5. Containment and Remediation
- Isolate Affected Systems: Disconnect compromised servers from the network to prevent further spread of malware or data theft.
- Password Reset: Force a password reset for all accounts that may have been affected, especially administrator accounts. Implement strong passwords and multi-factor authentication (MFA).
- Patch Vulnerabilities: Apply any outstanding security patches to servers and network devices.
6. Long-Term Security Improvements
- Access Control System: Implement a proper access control system with audit trails (e.g., keycard readers, biometric scanners).
- Security Cameras: Install security cameras inside and outside the server room to monitor activity.
- Intrusion Detection/Prevention Systems (IDS/IPS): Deploy IDS/IPS solutions to detect and prevent malicious activity on your network.
- Regular Security Audits: Conduct regular security audits and penetration testing to identify vulnerabilities.
- Log Management: Implement a centralised log management system for better monitoring and analysis.
rsyslogis a common option.
- Incident Response Plan: Develop and test an incident response plan to handle future security breaches effectively.
7. Reporting
Report the breach to relevant authorities (e.g., police, data protection agency) as required by law. Also inform affected parties if their data may have been compromised.