Article

Storage security needs to consider storage media

Maxine Kincora, contributing writer

Channel takeaway: Storage security is being noticed as a glaring weak spot for many SMBs. Unfortunately, most shops don't know they are exposed or where to begin trying to fix the problem. One area that is often over looked is the media that data is stored on. Fortunately, VARs can be an integral part of the solution. By educating customers about the flaws in their storage security and creating a comprehensive protocol for mending these weak spots and keeping data that has been backed up secure, the customers will have a much easier time sleeping at night.

    Requires Free Membership to View

Strategic Storage: Storage security -- Change old habits and stop data theft

Web-based storage service providers offer small and medium-sized businesses (SMBs) an alternative to doing backup on tape, disk or hard drives, but SMBs have some legitimate concerns about such services. Get their feedback and find out how you may be able to quell their concerns.

More on storage security:
Data-in-transit security and tracking services

Integration demands drive storage security offerings

Historically, added security for storage was deemed unnecessary because storage was done on relatively isolated standalone devices, according to Dennis Martin, senior analyst for storage management software and security at Greenwood Village, Colo.-based Evaluator Group. Since the physical connections of those devices to the hosts were hidden, they were difficult to find within a network. If outsiders couldn't get to the host, they couldn't get to the storage device or to the stored data.

With the advent of new storage technologies, storage is no longer so hidden. Fibre channel and iSCSI SANs are accessed and managed over IP connections, with all the risks to which IP exposes networks.

"Islands of SANs within an environment have been considered low-risk areas," Damoulakis says. "However, the SAN infrastructure connects to hosts and hosts are on the network. To do very serious damage would simply require working through a compromised host and getting access to this largely unsecured storage network."

Standard corporate network security practices -- such as password management, enforcing access controls, enabling audit trails, securing management interface points -- should all be applied to storage, the experts agree.

Every best practice in security that's in place for the network should be implemented for storage. Here's the experts' list of some important best practices:

  • Audit and do a risk assessment on the storage infrastructure, looking for risks and vulnerabilities.
  • Adopt and enforce data encryption policies. Best practices include classifying data, and applying encryption to private and confidential data through the lifecycle of the data.
  • Treat backup as an "orange alert" process. Adopt secure media management tracking and handling policies.

Read the rest of Kincora's article on SearchStorage.com


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: