{"id":431565,"date":"2024-10-20T07:28:54","date_gmt":"2024-10-20T07:28:54","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bicsi-009-2019\/"},"modified":"2024-10-26T14:13:14","modified_gmt":"2024-10-26T14:13:14","slug":"bicsi-009-2019","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bicsi\/bicsi-009-2019\/","title":{"rendered":"BICSI 009 2019"},"content":{"rendered":"

Data centers come in all sizes and serve a variety of users, applications, and services. While the design of data centers can mitigate many risks to uptime, even the best design can be foiled by lax or inadequate care in operations. Introducing BICSI 009-2019, the first open-consensus standard providing more than a framework for data center operation policies and practices. Developed by a global volunteer base, the material within reflects operational experience and lessons from a wide variety of data center owners, operators, designers, and consultants covering data centers from the small enterprise to the large hyperscale colocation data center and everything in-between. Starting with the applicable operational material from BICSI 002-2019, BICSI 009 revised and expanded this content prior to developing additional content specific for data center owners, operators and managers. Highlights As the foundation standard for data center operations, BICSI 009 features 10 chapters covering the following and more: Governance Standard operating procedures ICT cut-overs, technology refresh and migration Work orders Work safety Storage, staging, and related tasks Equipment delivery and shipments Security Security plan Physical, cyber & IT security Material control and loss prevention Computer room and critical facility areas special considerations Event response Maintenance Management Maintenance plans and contracts Patrols and inspections ITE moves, adds and changes Power, cooling, and cabling systems Building area and physical space maintenance Emergency operating procedures On-site and offsite events Emergency response Disaster recovery Management Operations management Management tools (e.g., DCIM, BMS, AIM) Service provider management Change control and documentation<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
3<\/td>\nBlank Page <\/td>\n<\/tr>\n
4<\/td>\nBICSI International Standards <\/td>\n<\/tr>\n
6<\/td>\nTABLE OF CONTENTS <\/td>\n<\/tr>\n
12<\/td>\nINDEX OF FIGURES <\/td>\n<\/tr>\n
16<\/td>\n1 Introduction
1.1 General
1.2 Purpose
1.2.1 ICT Operations <\/td>\n<\/tr>\n
17<\/td>\n1.2.2 Facilities Operations
1.2.3 Data Center Management
1.3 Impact of Redundancy on Operations and Maintenance Procedures <\/td>\n<\/tr>\n
18<\/td>\n1.3.1 Standard Operating Procedures
1.3.2 Maintenance Operating Procedures
1.3.3 Emergency Operating Procedures
1.4 Categories of Criteria <\/td>\n<\/tr>\n
20<\/td>\n2 Scope <\/td>\n<\/tr>\n
22<\/td>\n3 Required Standards and Documents <\/td>\n<\/tr>\n
24<\/td>\n4 Definitions, Acronyms, Abbreviations, and Units of Measurement
4.1 Definitions <\/td>\n<\/tr>\n
31<\/td>\n4.2 Acronyms and Abbreviations
4.3 Units of Measurement <\/td>\n<\/tr>\n
32<\/td>\n5 Governance and Assessment
5.1 Introduction
5.1.1 Public Governance
5.1.2 Private Governance
5.2 Compliance <\/td>\n<\/tr>\n
33<\/td>\n5.2.1 Documentation
5.3 Voluntary Assessment Programs
5.3.1 Overview
5.4 Types of Assessments
5.4.1 Introduction
5.4.2 Risk Assessment <\/td>\n<\/tr>\n
34<\/td>\n5.4.3 Data Center Operations and Maintenance Assessment
5.4.4 Security Assessment <\/td>\n<\/tr>\n
36<\/td>\n6 Standard Operating Procedures
6.1 Introduction
6.2 BICSI Class Definition and Standard Operating Procedures
6.3 ICT Cut-overs, Technology Refresh and Migration
6.3.1 Cut-Overs
6.3.2 Change Control Process <\/td>\n<\/tr>\n
37<\/td>\n6.4 Work Orders
6.4.1 Introduction
6.4.2 Data Center Installation Work Order <\/td>\n<\/tr>\n
39<\/td>\n6.4.3 Example of a Data Center Work Order Process for ITE <\/td>\n<\/tr>\n
40<\/td>\n6.5 Work Safety
6.5.1 Scope
6.5.2 Safety Planning <\/td>\n<\/tr>\n
41<\/td>\n6.5.3 Safety Meetings and Briefings <\/td>\n<\/tr>\n
42<\/td>\n6.5.4 Emergencies <\/td>\n<\/tr>\n
43<\/td>\n6.5.5 Electrical Safety <\/td>\n<\/tr>\n
44<\/td>\nFigure 6-1 Example of a LOTO Electrical Safety Form <\/td>\n<\/tr>\n
45<\/td>\nFigure 6-2 Example of a LOTO Justification Form
6.5.6 Mechanical Safety <\/td>\n<\/tr>\n
46<\/td>\n6.5.7 Personal Protective Equipment (PPE) <\/td>\n<\/tr>\n
48<\/td>\n6.5.8 Work Place Safety Training <\/td>\n<\/tr>\n
50<\/td>\nFigure 6-3 Example LOTO Custody of Equipment Flow Chart <\/td>\n<\/tr>\n
51<\/td>\n6.5.9 Accident Reporting <\/td>\n<\/tr>\n
52<\/td>\nFigure 6-4 Example of an Accident \/ Incident Reporting Form <\/td>\n<\/tr>\n
53<\/td>\n6.6 Storage, Staging, and Related Tasks
6.6.1 Storage
6.6.2 Staging
6.6.3 Packing and Unpacking
6.6.4 Manufacturer Testing
6.6.5 End User Burn-In
6.7 Interface with Data Center Users
6.7.1 Data Center Service <\/td>\n<\/tr>\n
55<\/td>\n6.7.2 Correspondences (Interface procedures) <\/td>\n<\/tr>\n
56<\/td>\n6.7.3 Facility Operations
6.7.4 Facility Reports <\/td>\n<\/tr>\n
57<\/td>\n6.7.5 Periodical Meetings <\/td>\n<\/tr>\n
58<\/td>\n6.7.6 External Personnel Access
6.8 Equipment Delivery and Shipments
6.8.1 Materials Management
6.8.2 Procurement Processes
6.8.3 Shipping Considerations <\/td>\n<\/tr>\n
59<\/td>\n6.8.4 Receiving Materials
6.8.5 Handling Hazardous Materials <\/td>\n<\/tr>\n
60<\/td>\n7 Security
7.1 Introduction
Figure 7-1 Security Measures <\/td>\n<\/tr>\n
61<\/td>\n7.2 Risk and Threat Assessment
7.3 Regulatory and Insurance Considerations
7.3.1 Introduction
7.3.2 Regulations or Laws Affecting Security <\/td>\n<\/tr>\n
62<\/td>\n7.4 Data Center Security Plan
7.4.1 Introduction
7.4.2 General Recommendations
7.4.3 Physical Security Plan <\/td>\n<\/tr>\n
63<\/td>\n7.4.1 Cyber\/IT Security Plan <\/td>\n<\/tr>\n
64<\/td>\n7.5 Physical Security Systems
7.5.1 Access Control <\/td>\n<\/tr>\n
65<\/td>\nFigure 7-2 Levels of Access Control <\/td>\n<\/tr>\n
68<\/td>\n7.5.2 Badging and Identification <\/td>\n<\/tr>\n
69<\/td>\n7.5.3 Signage and Display Policy and Procedures
7.5.4 Fire Prevention, Detection and Suppression
Figure 7-3 Example of a Visually Distinctive Expired Badge
7.5.5 Video Surveillance
7.5.6 Monitoring and Alarms <\/td>\n<\/tr>\n
70<\/td>\n7.6 Material Control and Loss Prevention
7.6.1 Introduction
7.6.2 Recommendations <\/td>\n<\/tr>\n
71<\/td>\n7.6.3 Classification and Confidentiality of Sensitive Resources
7.6.4 Hazardous Material Storage
7.6.5 Disposal of Media and Printed Material
7.6.6 Theft
7.7 Data Center Personnel
7.7.1 Introduction <\/td>\n<\/tr>\n
72<\/td>\n7.7.2 Hiring of Personnel
7.7.3 Reporting
7.7.4 Terminations of Personnel <\/td>\n<\/tr>\n
73<\/td>\n7.8 Building Site
7.8.1 Site Access and Egress
7.8.2 Security Guards <\/td>\n<\/tr>\n
74<\/td>\n7.8.3 Office Areas
7.9 Assessments
7.10 Computer Room and Critical Facility Areas Special Considerations
7.10.1 Requirements
7.10.2 Recommendations <\/td>\n<\/tr>\n
75<\/td>\n7.11 Cyber\/IT Security Policy and Procedures
7.11.1 Introduction
7.11.2 Passwords
7.11.3 Information Control
7.12 Event Response
7.12.1 Physical Security <\/td>\n<\/tr>\n
76<\/td>\n7.12.2 Cyber\/IT Security Event Response
7.12.3 Post-Mortem Processes and Policies\u00a0 <\/td>\n<\/tr>\n
78<\/td>\n8 Maintenance Operating Procedures
8.1 Introduction
8.1.1 BICSI Class Definition and Maintenance Procedures
8.1.2 Maintenance Activities and Risk <\/td>\n<\/tr>\n
79<\/td>\nFigure 8-1 Risk During Normal vs Maintenance Modes
8.2 Maintenance Document Library
8.2.1 Introduction
8.2.2 Documentation <\/td>\n<\/tr>\n
80<\/td>\n8.2.3 Maintenance Record Keeping
8.3 Maintenance Management
8.3.1 Introduction
8.3.2 Maintenance Types <\/td>\n<\/tr>\n
83<\/td>\nFigure 8-2 Example of Measurements Points for Vibrational Testing
8.4 Equipment Maintenance Plan
8.4.1 Introduction <\/td>\n<\/tr>\n
84<\/td>\n8.4.2 Maintenance Tasks for EMPs
8.4.3 EMP Elements <\/td>\n<\/tr>\n
85<\/td>\n8.5 Maintenance Contracts
8.5.1 Introduction
8.5.2 Requirements
8.5.3 Recommendations <\/td>\n<\/tr>\n
86<\/td>\n8.5.4 Maintenance Specification <\/td>\n<\/tr>\n
87<\/td>\n8.6 Routine Patrols and Inspections
8.7 Power Systems
8.7.1 Introduction
8.7.2 Requirements <\/td>\n<\/tr>\n
88<\/td>\n8.7.3 General Recommendations
8.7.4 Grounding and Lightning Protection <\/td>\n<\/tr>\n
89<\/td>\n8.7.5 Utility Input Switchgear
8.7.6 Distribution Systems
8.7.7 Mechanical Equipment Power Supply
8.7.8 Control Systems
8.7.9 Transfer Switches <\/td>\n<\/tr>\n
90<\/td>\n8.7.10 UPS (Uninterruptable Power Supply) <\/td>\n<\/tr>\n
91<\/td>\n8.7.11 Backup and Emergency Power Systems <\/td>\n<\/tr>\n
92<\/td>\n8.8 ITE Moves, Adds and Changes
8.8.1 Equipment Maintenance Outages <\/td>\n<\/tr>\n
93<\/td>\n8.9 Cooling Systems
8.9.1 Introduction <\/td>\n<\/tr>\n
94<\/td>\n8.9.2 Preventative Maintenance Program <\/td>\n<\/tr>\n
95<\/td>\n8.9.3 Maintenance and Replacement of Components <\/td>\n<\/tr>\n
99<\/td>\n8.10 Computer Room Airflow
8.10.1 Introduction
8.10.2 Blanking Panels
8.10.3 Rail Blanking
8.10.4 Cable Access Holes <\/td>\n<\/tr>\n
100<\/td>\n8.10.5 External Containment Functionality
8.10.6 Cable Hygiene
8.10.7 Access Floor System Maintenance <\/td>\n<\/tr>\n
101<\/td>\n8.10.8 Floor Tile Placement
8.10.9 Room Sensors
8.10.10 Recommendations
8.11 Cabling Systems Maintenance
8.11.1 Introduction <\/td>\n<\/tr>\n
102<\/td>\n8.11.2 Recommendations
8.12 Building Systems
8.12.1 Fire Detection, Suppression and Notification <\/td>\n<\/tr>\n
103<\/td>\n8.12.2 Monitoring and Management Systems
8.12.3 Physical Security and Access Control <\/td>\n<\/tr>\n
104<\/td>\n8.13 Area and Physical Space Maintenance
8.14 Spare Parts and Consumables
8.14.1 Consideration <\/td>\n<\/tr>\n
105<\/td>\n8.14.2 Management of Spares and Spare Parts
8.15 IT Network and Telecommunication Systems <\/td>\n<\/tr>\n
106<\/td>\n9 Emergency Operating Procedures
9.1 Introduction
9.2 Response Documentation
9.3 Internal Data Center Events
9.3.1 Equipment Failures <\/td>\n<\/tr>\n
107<\/td>\n9.3.2 Critical Services Failures
9.3.3 Operational Troubles <\/td>\n<\/tr>\n
108<\/td>\n9.4 On-Site Events
9.4.1 Initial Event Response <\/td>\n<\/tr>\n
109<\/td>\n9.4.2 Upon Event Resolution
9.5 Offsite Events
9.5.1 Initial Event Response
9.5.2 Upon Event Resolution <\/td>\n<\/tr>\n
110<\/td>\n9.6 Emergency Response to Natural Disasters
9.6.1 Initial Event Response
9.6.2 Upon Event Resolution
9.7 Emergency Response to Physical Security Breach <\/td>\n<\/tr>\n
111<\/td>\n9.8 Emergency Response to Personal Injury
9.8.1 Initial Event Response
9.9 Disaster Recovery
9.9.1 Introduction
9.9.2 Plan <\/td>\n<\/tr>\n
112<\/td>\n9.9.3 Personnel
9.9.4 Essential Disaster Recovery Components <\/td>\n<\/tr>\n
113<\/td>\n9.9.5 Testing of Disaster Recovery Plans
9.9.6 Chemical, Biological, Radiological, Nuclear and Explosives <\/td>\n<\/tr>\n
114<\/td>\n10 Management
10.1 Operations Management Overview
10.1.1 Service Operations <\/td>\n<\/tr>\n
115<\/td>\n10.1.2 Service Desk <\/td>\n<\/tr>\n
116<\/td>\n10.1.3 IT Service Management (ITSM) <\/td>\n<\/tr>\n
117<\/td>\n10.1.4 IT Operations Management <\/td>\n<\/tr>\n
118<\/td>\n10.1.5 Technical Management
10.1.6 Application Management <\/td>\n<\/tr>\n
119<\/td>\n10.1.7 IT Security Management
10.1.8 Management of Facility Operations <\/td>\n<\/tr>\n
120<\/td>\n10.2 Management Tools
10.2.1 Overview
10.2.2 DCIM <\/td>\n<\/tr>\n
122<\/td>\nFigure 10-1 DCIM System Outline Configuration <\/td>\n<\/tr>\n
128<\/td>\n10.2.3 Infrastructure Asset Management <\/td>\n<\/tr>\n
129<\/td>\n10.2.4 Configuration Management Data Base <\/td>\n<\/tr>\n
130<\/td>\nFigure 10-2 Configuration Management Data Base (CMDB) Model <\/td>\n<\/tr>\n
131<\/td>\n10.2.5 Building Management Systems (BMS) <\/td>\n<\/tr>\n
132<\/td>\n10.2.6 Automated Infrastructure Management (AIM) Systems <\/td>\n<\/tr>\n
134<\/td>\n10.3 Operational Management Modules
10.3.1 Introduction
10.3.2 Asset Management Module <\/td>\n<\/tr>\n
135<\/td>\n10.3.3 Network Discovery Module
10.3.4 Connectivity Management Module
10.3.5 Power Management Module <\/td>\n<\/tr>\n
136<\/td>\n10.3.6 Capacity Planning Module <\/td>\n<\/tr>\n
137<\/td>\n10.3.7 Dashboard Module <\/td>\n<\/tr>\n
138<\/td>\n10.3.8 Workflow Module
10.3.9 End-to-End Resource Management
10.4 Service Provider Management
10.4.1 Introduction
10.4.2 Cloud Service Models <\/td>\n<\/tr>\n
139<\/td>\nFigure 10-3 Data Center Ownership Models
10.4.3 Cloud Installation Models
10.4.4 Cloud Considerations <\/td>\n<\/tr>\n
140<\/td>\n10.5 Metrics and Measurement
10.5.1 Introduction
Figure 10-4 Data Center Metrics <\/td>\n<\/tr>\n
141<\/td>\n10.6 Change Management, Change Control, and Documentation
10.6.1 Introduction <\/td>\n<\/tr>\n
142<\/td>\n10.6.2 Scope
10.6.3 Requirements for Change Management Procedures <\/td>\n<\/tr>\n
143<\/td>\n10.6.4 Types of Changes in a Data Center
10.6.5 Risk Classifications <\/td>\n<\/tr>\n
144<\/td>\n10.6.6 Change Review Board (CRB)
10.7 Data Center Security <\/td>\n<\/tr>\n
145<\/td>\n10.7.1 Hardware Security Technologies
10.7.2 Firmware Security Technologies
10.7.3 Virtualization Security Technologies
10.7.4 Other Security Technologies <\/td>\n<\/tr>\n
146<\/td>\n10.8 Operations Organizational Structure
10.8.1 Introduction <\/td>\n<\/tr>\n
147<\/td>\n10.9 Training
10.9.1 Facility Systems <\/td>\n<\/tr>\n
150<\/td>\nAppendix A Related Documents (Informative) <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BICSI 009-2019, Data Center Operations and Maintenance Best Practices<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BICSI<\/b><\/a><\/td>\n2019<\/td>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":431571,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2681],"product_tag":[],"class_list":{"0":"post-431565","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bicsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/431565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/431571"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=431565"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=431565"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=431565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}