Engineering secure and resilient data centres requires moving beyond the traditional focus on uptime and redundancy. While redundancy provides essential backup capacity, it does not guarantee sustained normal operation during a crisis.

Over the last decade, the data-centre landscape has transformed from self-contained, on-premises IT sites to globally distributed, cloud-connected, AI-driven infrastructure. Previously segregated systems, namely operational technology (OT) and building management systems (BMS), have converged.

This convergence enables greater efficiency and automation but also introduces new systemic risk pathways, compelling organisations to redefine their security strategy.

Resilience-led engineering, designing systems that will continue to function when assumptions fail, necessitates an understanding of how these interdependent subsystems behave collectively - not merely how each performs in isolation.

Artificial Intelligence has set the agenda

AI remains at the centre of the data-centre economy. But unlike conventional cloud computing, AI infrastructure introduces a new level of complexity. The shift to AI has created extreme concentration risk, where disproportionate financial, operational and strategic value, is consolidated within individual facilities.

Closely coupled systems mean that the failure of a single component can rapidly cascade into full service interruption, escalating consequence severity. A primary operational challenge therefore becomes isolation: the ability to contain a failing zone without compromising core system functions.

From this perspective, physical security controls are a core component of data-centre resilience. Effective design depends on a site’s ability to maintain effective security control even when individual components, layers or procedures fail. It assumes that barriers will be breached, systems will go offline, and people will make mistakes.

 Truly resilient data centres are therefore engineered through:

  • Layered protection
  • Zoning and compartmentalisation
  • Independent detection paths
  • Fail-secure or fail-safe behaviours that preserve security under degraded conditions
  • Operational resilience, including clear response authority and tested procedures
  • The ability to isolate, contain and recover without cascading impact

Resilience-led engineering shifts the focus from the reactive question: “Did the perimeter hold?” to a fundamental one: “Will the security architecture continue to function as a system throughout the incident?”

In this environment, resilience is ultimately a measure of how intelligently risk is engineered into the ecosystem.

The AI Compute Contest is geopolitical

The global race to dominate the AI‑driven economy is fundamentally geopolitical. To avoid falling behind, governments and companies are moving to secure control over the infrastructure and supply chains that underpin AI compute.

Regulation has become a strategic lever to control access and investment. We see this in the form of:

  • Data-localisation policies, as states seek to secure digital sovereignty
  • Export controls and counter controls, mainly from the US, designed to determine who can access certain technologies

Energy geopolitics, power availability, reliability and cost, further complicates this landscape. In practical terms, data-centre site selection has become more politicised, extending well beyond power and permitting considerations to include:

  • Export‑control alignment
  • Regulatory stability
  • Supply‑chain realities
  • GPU availability
  • Licensing constraints
  • Firmware assurance
  • Trusted‑vendor requirements
  • Governance frameworks

In this new economy, security considerations take precedence over regional preference. Organisations must navigate these geopolitical complexities when deciding where to host data, with enhanced due diligence mandated by an expanding web of regulatory requirements.

Convergence of cyber and physical threats

The specialised hardware and firmware ecosystems that AI-dependent data centres rely on create deep dependencies on a narrow vendor base and highly embedded technologies. Consequently, cyber compromise now carries implications that extend far beyond data exposure.

A breach of third-party BMS, access-control platforms or remote monitoring tools can directly disrupt cooling, power distribution, fire suppression and physical site access. In this context, cyber weaknesses in the supply chain translate into immediate physical resilience risk.

Detection gaps between IT and BMS networks can leave operators blind to attacks targeting heating, ventilation, air conditioning, power management and access systems – actions capable of opening secure doors, disabling alarms or destabilising power.

While hyperscalers increasingly design for this convergence by integrating cyber, OT and physical security, co-location and legacy assets often maintain siloed disciplines, creating larger attack surfaces. Attackers exploit cyber weaknesses to trigger physical disruption at scale.

Barriers to expansion

AI‑driven data‑centre infrastructure expansion is increasingly constrained by power availability, natural‑resource limitations, climate pressures, geopolitical tension and rising social discontent.

Environmental and resource constraints are among the most immediate barriers. Climate change, extreme weather and chronic water scarcity pose direct operational risks to facilities requiring unprecedented levels of power and cooling. As a result, operators are compelled to redesign facilities around energy efficiency, liquid cooling, renewable power and modular architecture that can adapt to shifting resource availability.

These constraints are already reshaping development feasibility. In parts of Australia, for example, drought conditions mean that earmarked sites may simply be unable to secure the water volumes required for high-density AI workloads. Similarly, in Malaysia, even though authorities are relentlessly working to secure sufficient power and data sources for data centres, the rate of construction is now outpacing the capacity of the national grid, creating a risk that power infrastructure may fall behind project demand.

Physical and structural demands compound the sustainability challenge. AI-optimised data halls now host extremely heavy, GPU-dense racks, often exceeding 3,700 kilograms per rack in some high-performance deployments. A single 8-MW hall may require only a few dozen racks, but the cumulative structural load drives enormous concrete volumes for slabs and multi-storey floors. Cement production is itself a major source of carbon emissions, meaning that even before power and cooling are considered, the embodied carbon footprint of the AI data centre draws stricter regulatory scrutiny, often lengthening permitting timelines in jurisdictions with aggressive climate targets.

Reputational and societal risks are now inseparable from operations. As water, power and land become more politically sensitive, AI data centres are increasingly viewed not as neutral infrastructure but as contested assets. Communities that perceive themselves as bearing the environmental burden without receiving commensurate economic benefits are more likely to mobilise against new development, positioning data centres as strategic targets. These local tensions often escalate into national scrutiny, the case of xAI’s Memphis facility illustrates this.

Beyond engineering and cyber controls, operators and investors must account for the environmental, political and societal contexts in which data centres are being developed. A broader, resilience-led lens is imperative.


Integrating enhanced due diligence

Enhanced due diligence is critical for informed investment in data centre assets. It involves comprehensive risk assessments to flag areas of concern for further investigation or remediation.

Case study: Asset acquisition due diligence in Southeast Asia

  • Control Risks supported a global investment fund seeking a comprehensive risk assessment before investing in an acquisition. The client needed clarity on opaque ownership structures, regulatory ties and potential corruption exposure.
  • Our experts conducted extensive public-record research in multiple languages, supplemented by discreet source enquiries in six countries. We carried out over 50 interviews and drew on decades of intelligence and regional sources to map ownership structures, identify ultimate beneficiaries and analyse the political and regulatory landscape.
  • Our assessment uncovered connections between certain entities and influential regulators and political factions. Control Risks helped the client understand the level of risk before the investment decision was finalised.

Firms engage Control Risks to conduct comprehensive due diligence and avoid stepping into acquisitions they do not fully understand.

The value of early engagement

Engaging security expertise during the master planning phase is fundamental to resilience and cost effectiveness. Retrofitting security design during or after construction leads to significant cost overruns and compromised outcomes.  

A recent case illustrates the cost of late engagement:

Case study: Security design for an eight-storey data centre

  • A developer in Southeast Asia had progressed to the construction stage of an eight-storey data centre without a security consultant. Upon securing a global technology company as a tenant, the client discovered the design failed to meet the tenant’s stringent minimum-security standards. The tenant identified critical non-compliant features and Control Risks was engaged during active construction to retrofit the design.
  • We conducted security assessments and managed extensive reworks to align the physical and electronic security systems including access control and card systems with the tenant’s mandatory standards, achieving over 75% compliance.
  • Control Risks’ intervention salvaged the project and guided the client to meet the tenant’s stringent security standards.

In addition to late engagement, common mistakes that undermine resilient design include:

  • Underestimating site context, such as poor standoff distance or flood risk
  • Implementing weak zoning that fails to separate public, operational, and critical areas
  • Co-locating critical infrastructure like power and cooling, which limits recovery options
  • Structural oversights, including inadequate floor loading or insufficient space for future upgrades

Early engagement prevents these pitfalls and ensures resilience is built in from day one.

Partnerships that empower the right questions

Resilience is not solely a technical challenge - it is an engineering, cyber, regulatory, operational and strategic one, all unfolding simultaneously.

In an environment where these risks are deeply intertwined, independent assurance is critical to mitigate blind spots and groupthink. It provides the necessary challenge to test assumptions, validate security designs and interrogate operational decisions.

This is particularly important in regions scaling rapidly, where the freedom to innovate must be matched by the expertise to connect cyber, physical security, compliance and engineering disciplines early and deeply enough to keep pace with current realities and emerging risks.

Contact our global Data Centre Resilience team for integrated security and risk management services.


You may also be interested in

Get in touch

Can our experts help you?