Two types of security must be addressed in the data center design. It is important to limit access of unauthorized people into the data center proper, and to prevent unauthorized access to the network.
Access to the data center should be strictly regulated, limited to personnel necessary to keeping the equipment in operation. It should not be necessary for anyone else to enter the data center. Those allowed access should have a clear understanding of the sensitivities of the hardware to avoid accidental contact with buttons, cable connections, terminals, or emergency response controls.
All points of access should be controlled by checkpoints, and coded card readers or cipher locks.