18 Storage security
This chapter describes storage security best practices. It describes the following topics:
• Storage security threats
, page 401
• Storage security compliance
, page 402
• Security technologies
, page 402
• HP security strategy
, page 404
• Storage security best practices
, page 406
• Assessing security risks
, page 407
• HP storage security solutions
, page 407
Storage security threats
Securing SAN environments has become an increasingly important aspect of data security. IT
organizations face many security threats and must comply with numerous industry and government
regulations. In the past, IT organizations accepted that authentication issues were handled by the
network architecture; they were not responsible for SAN security.
The NSA IATF defines five security attack classes that you should consider when defining your solution
(
Table 193
).
Table 193 Security attack classes
Description
Attack class
Attacks that can disclose information to an attacker.
Passive attacks include:
•
Analyzing traffic
•
Monitoring unprotected communications
•
Decrypting weakly encrypted traffic
•
Capturing authentication information (passwords)
An example of a passive attack is the disclosure of information such as credit card numbers
and passwords.
Passive
Attacks that can disclose information, deny service, or modify data.
Active attacks include:
•
Attempting to circumvent or break protection features
•
Introducing malicious code
•
Stealing or modifying information
•
Attacking a network backbone
•
Exploiting in-transit information
•
Penetrating an enclave
•
Attacking when a remote user attempts to connect to an enclave
Active
SAN Design Reference Guide
401
Summary of Contents for StorageWorks 4000/6000/8000 - Enterprise Virtual Arrays
Page 26: ......
Page 34: ...SAN design overview 34 ...
Page 60: ...SAN fabric topologies 60 ...
Page 80: ...Fibre Channel routing 80 ...
Page 82: ......
Page 92: ...H series switches and fabric rules 92 ...
Page 156: ...C series switches and fabric rules 156 ...
Page 182: ...SAN fabric connectivity and switch interoperability rules 182 ...
Page 184: ......
Page 270: ...XP and VA storage system rules 270 ...
Page 276: ...Enterprise Backup Solution 276 ...
Page 278: ......
Page 354: ...SAN extension 354 ...
Page 398: ...Network Attached Storage 398 ...
Page 400: ......
Page 416: ...Storage security 416 ...
Page 428: ...Best practices 428 ...
Page 456: ...456 ...