- Is the storage removable? If so, there are more opportunities for problems. If the data is transported off site and physical control of the storage is turned over to an outside party, then some form of encryption may be required if the data is sensitive.
- Is there physical security where storage system and data reside? If not, this needs to be resolved first.
- Is the storage product equipped with prudent administrative controls? Are the number of people who have access to the data limited based on skill and role-based passwords, access controls lists, etc? Protecting data in a system is about controlling access. This happens primarily from the application standpoint because the data is meant to be used for processing.
Protecting data at rest that is not removable is about controlling access. Encrypting data at rest in an active storage system may not protect the data if the normal application access path is used -- the encryption may be useless without security around the application access. Also, encryption and other security measures come at the price of more operational expense such as managing keys and access controls. These require more staff, most product costs, and the barriers may significantly impede some normal operations.
Security is an overall system issue that starts with the quality of the personnel involved. It can't be looked at from a device perspective without addressing all of the other issues first.
Dig Deeper on Storage Backup and Disaster Recovery Services
Related Q&A from Randy Kerns
Compare SAN and NAS, and find out what to consider when using each storage system format. Object storage and the cloud are also affecting the storage... Continue Reading
Logical unit numbers are a logical abstraction between a physical disk device and applications. Learn more about LUN use cases and LUN security ... Continue Reading
What is the one hidden gotcha that you'd advise users about if they were shopping for an all-flash storage array? Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.