/dq/media/media_files/2026/02/25/sanjay-motwani-2026-02-25-16-00-47.jpg)
Sanjay Motwani, Vice President – APAC, Data Centre- White Space, Legrand Data Centre Solutions
India is entering a defining phase in its digital evolution. With the government accelerating plans to position the nation as a global data hub, the country’s data centre footprint is expanding at an accelerated rate. According to CBRE, India’s total operational data-centre (DC) capacity has recently crossed the 1.5 gigawatt (GW) threshold. That capacity boom is driven not just by legacy workloads but by the ascent of AI, cloud adoption, data localisation mandates, and surging data consumption.
With investments flowing in, CBRE tracks nearly USD 60 billion invested between 2019 and 2024 alone. Further, the firm estimates that total investment commitments will exceed USD 100 billion by 2027. This expansion is not evenly spread. A handful of cities, Mumbai, Chennai, Delhi NCR, and Bengaluru, currently account for nearly 90% of India’s DC capacity. Mumbai alone holds a 53% share of the total capacity, underscoring the city’s strategic importance as a digital hub, thanks to undersea cable landings and robust internet exchange infrastructure.
But this explosive growth, while critical for India’s digital ambitions, brings new challenges. As demand for computing and storage surges, infrastructure complexity increases, and traditional cybersecurity playbooks, focused on firewalls, network defense, encryption, and access controls at the server layer, are no longer sufficient.
A Physical Layer That Has Become Digital
Until recently, rack-mounted components, power distribution units (PDUs), biometric locks, environmental sensors, and remote management controllers were simple, isolated, and largely analog. Their purpose was operational, not digital.
Today, that has changed. These devices now:
• Store user credentials
• Authenticate identity
• Communicate with data centre networks
• Run firmware and logic-based decisioning
• Control power, access, and uptime
They are essentially intelligent, network-connected endpoints, but without the same cybersecurity rigor applied to servers, switches, or applications.
This shift is not theoretical; it is already a proven risk. A documented industry case showed attackers exploiting an unpatched PDU firmware vulnerability to remotely shut down power to mission-critical servers. The breach bypassed standard network defences because the infrastructure supporting the servers wasn’t protected at the same level as the servers themselves.
The Consequence: Digital Breach Becomes Physical Impact
India has already experienced attacks where infrastructure compromise caused real-world disruption. The 2022 cyber intrusion into Tata Power impacted both IT and OT environments, triggering emergency response coordination and reinforcing that operational systems are no longer immune to cyber risk.
More recently, ransomware has been observed targeting:
• Building automation and HVAC systems
• Backup power infrastructure
• Industrial controllers
• Remote access points in critical facilities
The line between cyber compromise and physical failure has dissolved. And as IBM’s 2024 report highlights, the cost of a breach now averages USD 4.9 million, excluding reputational loss, compliance liabilities, and regulatory scrutiny.
For data centre operators supporting BFSI, healthcare, emergency services, and AI workloads, such disruption is not just expensive; it can be catastrophic.
Why Rack-Level Cybersecurity Must Become Standard
The rack sits at the intersection where data, infrastructure, and physical access converge. If compromised, rack-level devices can enable attackers to:
• Disable power and trigger downtime
• Unlock cabinets remotely
• Spread malware through trusted management channels
• Manipulate monitoring and alert systems
• Mask intrusion or tampering attempts
Securing the rack, therefore, requires a shift from reactive, patch-driven control to embedded resilience from day zero.
Core controls should include:
• Secure boot and cryptographically signed firmware
• AES-grade encryption for data in motion and at rest
• Hardware security modules for credential and key storage
• Multi-factor authentication at the cabinet level
• Continuous firmware vulnerability management
• Real-time physical intrusion monitoring tied to SOC workflows
But technology alone is not enough. The bigger shift must happen in culture and responsibility.
Data centre operations, facilities teams, and cybersecurity teams have historically worked in silos. Today, racks are not operational equipment; they are digital assets. That requires convergence.
The Strategic Mindset Shift
Data centre resilience is no longer measured by redundancy alone. It must now be measured by how well infrastructure can withstand, contain, and recover from an attempted breach.
The questions leaders must now ask include:
• Are rack-mounted systems included in patch and vulnerability management policies?
• Do access attempts trigger cybersecurity alerts, not just facilities logs?
• Are device credentials hardware-protected or stored in plaintext?
• Are SOC, operations, and facilities aligned to a unified risk model?
These questions were once considered operational details. They are now strategic resilience variables.
The Path Forward
As India accelerates its AI, edge, and sovereign cloud ambitions, the ecosystem must scale securely, not just quickly. The intelligence that now powers racks cannot remain invisible in cybersecurity frameworks.
Racks are no longer passive hardware infrastructure. They are active digital systems and a new point of vulnerability. To protect India’s digital future, cybersecurity must now start at the rack.
maildqindia@cybermedia.co.in
/dq/media/agency_attachments/UPxQAOdkwhCk8EYzqyvs.png)
Follow Us