Why Secure Storage Networks?
Computers & Technology → Networking
- Author George Pettit
- Published February 23, 2010
- Word count 384
Storage networks are predominantly used by organisations to centrally manage their data, reduce hardware costs (cost of server hardware, software, installation and maintenance) and downtime (when adding extra storage), effectively manage storage resources, and overcome computing power and storage scalability issues that the ‘independent storage for each system’ approach is affected with. These networks are regularly used to store critical information the compromise of which could affect the organisation’s competitive edge, cash-flow, profitability, legal and regulatory compliance, and corporate image.
Storage Area Networks (SANs) and Network Attached Storage (NAS) are the two types of storage networks used primarily. The two storage networks differ in various aspects; however, both these technologies were built with functionality in mind and not security, and are riddled with vulnerabilities that adversely affect the confidentiality, availability and integrity of the information stored within these networks. Serious vulnerabilities exist within these technologies that could allow unauthorised, (and in various cases) unauthenticated access to stored information. The support for IP based connections, iSCSI in SANs, and IP connections in NAS increase the accessibility but also enlarges the attack surface.
Additionally, organisations often contract third party service providers for deploying and maintaining the storage infrastructure. In many cases, the management of user permissions on the data is also outsourced to the service provider. This adds to the number of personnel who could access the organisations data and the locations where the data can be accessed from (if management is outsourced, the storage infrastructure and data could be accessible from all locations where the support staff is based).
Storage vendors have recently started realising the need for security and are now bundling network storage devices features that help secure the SAN and NAS environments; however, these features are not configured as factory defaults, and the lack of secure storage configuration policies, standards and guidelines at the organisation/service provider level introduces considerable weaknesses in the storage network environment.
The security of storage is paramount due to the criticality of information stored, the abundance of security weaknesses in the technology and due to the ever growing compliance and regulatory requirements. The process of securing storage environments should start with strict organisational policies targeted towards storage networks. Secure configuration standards and guidelines should then be developed and enforced in-line with vendor and industry best practices.
Sense of Security will continue to focus and innovate as an Information Security leader to government, non-profit and commercial entities. Sense of Security has offices in Sydney and Melbourne and is expanding in 2010.
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- Optimize Your Website for the Better Sight
- How To Develop & Implement A Network Security Plan
- Mastering VoIP: Overcoming Common Communication Challenges
- What Concerns Do Enterprises Have When Choosing Network Monitoring Software?
- Spectrum Router Red Light: Troubleshooting Guide and Solutions
- Web Development Made Easy: Why Outsourcing is the Smart Choice
- INTERNET OF THINGS
- Enhancing Business Communication with 3CX: A Powerful Unified Communications Solution
- How to Fix "No Signal, Please Check Your Antenna Connection" Error
- AN INTRODUCTION TO INTERNET MARKETING
- Passwordless is the New Cyber Security, Emir Ceric’s Meveto Transform Verification, Logging In and Remote Sign Out
- The Ultimate Guide to Master YouTube and Monetization
- Preventing data theft in an enterprise environment
- The Art Of Cold Calling [Mastery In Seven Simple Steps]
- Quantum Computing and the future of IT Security
- 5G TECHNOLOGY AND IOT: HOW DO THESE TRENDS RELATE?
- SkyVPN Launches New Gaming Servers with Dedicated Servers for PUBG
- Smm reseller panel
- Steps to Transfer Files Using Kindle Desktop Application
- Save time on your FTP updates with FTPGetter Professional
- Add a file hosting and sharing service to your site with YetiShare
- MCS Multicast Switch for Next Generation ROADM
- Business Networking Tips for Beginners
- Using Virtual Serial Ports in Proteus
- Network Security Checklist for All Types of Businesses
- Create Your Own File-Hosting Website with YetiShare
- Cat5 cable vs Cat6 Cables: What are the Contrast?
- Automate FTP Downloads and Uploads with FTPGetter Professional
- On Demand Freelance Marketplace For Field Engineers
- Cisco Network Infrastructure Services in San Francisco