- Is the storage removable? If so, there are more opportunities for problems. If the data is transported off site and physical control of the storage is turned over to an outside party, then some form of encryption may be required if the data is sensitive.
- Is there physical security where storage system and data reside? If not, this needs to be resolved first.
- Is the storage product equipped with prudent administrative controls? Are the number of people who have access to the data limited based on skill and role-based passwords, access controls lists, etc? Protecting data in a system is about controlling access. This happens primarily from the application standpoint because the data is meant to be used for processing.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Protecting data at rest that is not removable is about controlling access. Encrypting data at rest in an active storage system may not protect the data if the normal application access path is used -- the encryption may be useless without security around the application access. Also, encryption and other security measures come at the price of more operational expense such as managing keys and access controls. These require more staff, most product costs, and the barriers may significantly impede some normal operations.
Security is an overall system issue that starts with the quality of the personnel involved. It can't be looked at from a device perspective without addressing all of the other issues first.
Dig Deeper on Data Backup and Data Protection
Related Q&A from Randy Kerns
What is the one hidden gotcha that you'd advise users about if they were shopping for an all-flash storage array?continue reading
How much control do you have with all-flash storage arrays? How much control do you have over how arrays handle your data? Do you control the caching?continue reading
Vendors often publish numbers for 'usable' capacity versus 'effective' capacity. Can you explain this and how can you plan flash capacity needs with ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.