- Is the storage removable? If so, there are more opportunities for problems. If the data is transported off site and physical control of the storage is turned over to an outside party, then some form of encryption may be required if the data is sensitive.
- Is there physical security where storage system and data reside? If not, this needs to be resolved first.
- Is the storage product equipped with prudent administrative controls? Are the number of people who have access to the data limited based on skill and role-based passwords, access controls lists, etc? Protecting data in a system is about controlling access. This happens primarily from the application standpoint because the data is meant to be used for processing.
Protecting data at rest that is not removable is about controlling access. Encrypting data at rest in an active storage system may not protect the data if the normal application access path is used -- the encryption may be useless without security around the application access. Also, encryption and other security measures come at the price of more operational expense such as managing keys and access controls. These require more staff, most product costs, and the barriers may significantly impede some normal operations.
Security is an overall system issue that starts with the quality of the personnel involved. It can't be looked at from a device perspective without addressing all of the other issues first.
Dig deeper on Data Backup and Data Protection
Related Q&A from Retired Expert - Randy Kerns
Convincing customers to let you manage their storage needs comes down to one thing: Economics.continue reading
Storage as a service can be a valuable part of VARs business strategy. But in order to grow that area of the business, VARs need to demonstrate a ...continue reading
Storage as a Service doesn't have the ability to demonstrate that all compliance requirements are being met or that a chain-of-custody control has ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.