Technology Communities |
SecurityJump straight to an abstract:
The AbstractsIntroduction to Storage SecurityDownloadMany enterprises face the task of implementing data protection and datasecurity measures to meet a wide range of legal, regulator, and/or duediligence requirements. Increasingly, these requirements are being appliedto the storage layer, so it is important to understand the areas of mostrisk. In addition, understanding the differences between compliance andsecuring the data can be critical when information systems (IS) auditors areinspecting the storage ecosystem, looking for things like accountability,traceability, and proofs of encryption and destruction. This session lays a foundation for you to better understand storagesecurity risks, and their mitigation strategies. We will examine commonsecurity mistakes and challenges, including encryption and its impacts ondisaster recovery and business continuity. Finally, we will provide specificrecommendations and offer insights into emerging storage securitymeasures. After completing this tutorial, you should be able to:
Preparing for a Storage Security AuditDownloadThe thought of 'being audited' often evokes fear. Actions taken on storedinformation, storage infrastructure security and the practices of storageprofessionals are all subject to internal and external audit. Recently, thespecialized nature of IS auditing has extended to include the storageinfrastructure, however, auditors with specialized storage skills andknowledge are a limited resource. Auditors are required to be technicallycompetent in the storage area while being aware of the many standards andlegal requirements, in addition to security guidelines. That makes them agreat asset to our work! As a result, a storage security auditor can providegreat benefit to the storage professional and their organization. Storageprofessionals maintain information security policies within and around thestorage infrastructure; some establish policies and practices,independently, or in concert with others. When we set a security or storagepolicy, we do so based on our understanding of the requirements, ourpersonal experience and budget constraints. However, is our due diligenceenough? This is where the auditor can provide external validation andrecommendations (authentication, control, encryption, etc.) in midst oftheir role as professional skeptic and risk manager. In this session, wepresent a client case scenario, review the Storage Security Audit Processand then follow the process in a case study. Our goal: to prepare you for astorage security audit. In addition, we believe that you will have adifferent perspective on the security of storage infrastructures that youdesign today. Learning Objectives
Best Current Practices and Implementing the FC Security Protocol(FC-SP)DownloadThe variety of environments in which Fibre Channel fabrics are deployedmakes it difficult to rely on physical security. Different users may accessstorage subsystems over Fabrics that may span several sites. Securityservices are extremely important to prevent misconfigurations or access todata by non-authorized entities. A new standard, the Fibre Channel Security Protocol (FC-SP) can improvefabric security, reduce the total cost of ownership (FCO) and improveavailability. These benefits are the result of simplified management andmitigated threats, both accidental and malicious. This mostly technical tutorial identifies the best current practices forstorage security and shows how they are supported by FC-SP and identifiessome choices that vendors may make that are outside the standard. We developan in-depth understanding of the new security architecture for FibreChannel. Then, we identify key steps to help you implement the FC-SPframework. Within this framework, a Fibre Channel device can verify theidentity of another Fibre Channel device. A device may also use a sharedsecret and a key exchange protocol to establish security associationsapplied to Fibre Channel frames and information units. This framework alsoallows for the distribution of fabric-enforced policies within a FibreChannel fabric. Some of these features are quickly becoming available from avendor near you. Learning Objectives
Alternative Approaches to Storage SecurityDownloadEncryption and security are very popular topics in the storage industrytoday and there are many solutions available for different security threats.Security practices should be based upon a realistic threat assessment andthe level of confidentiality required. Overly complex security approachescan be as dangerous as not employing security at all. This session willfocus on encryption for data at rest with several storage architectures andexplain various alternatives for key management. There are many legal,regulatory, and security requirements that may conflict with one another.For example, certain compliance requirements may not be met with common keymanagement practices. Simplified key management using the encrypted storagemedium itself may offer the privacy protection that is required and meetother legal and regulatory requirements at much lower cost. Learning Objectives
"Look Ma, No Disks"DownloadAs more and more enterprise information is consolidated into fibrechannel storage networks, the likelihood of a storage administrator findingthemselves challenged to identify, collect and preserve electronic evidencerelevant to an intrusion, crime or corporate policy violation. Thispresentation presents a whirlwind tour of the processes for collection andpreservation of digital evidence and the challenges traditional forensicspractitioners face in this brave new world where a server may have nodirectly attached disks.
TCG Trusted Storage SpecificationsDownloadThe Trusted Computing Group (TCG) Storage WorkGroup has published formalspecifications for security and trust services on storage devices, includinghard drives, flash, and tape drives. The majority of hard drive and otherstorage device manufacturers participated. Putting security directly on thestorage device avoids the vulnerabilities of platform OS-based softwaresecurity. The details of the Specification will be highlighted, as well asvarious use cases, including Full Disk Encryption with enterprise keymanagement. Learning Objectives
ABCs of Data Encryption for StorageDownloadPublic disclosures of data 'indiscretions' have become regular enough andembarrassing enough that many organizations are exploring encryption optionsto simply stay out of the headlines. Those who have ventured into this spacequickly realize that there is no 'magic crypto fairy dust' that will makethe problems go completely away. However, with careful planning andjudicious use of the right technologies, organizations can eliminate many oftheir exposures. This session focuses on the efforts required at the storagelayer to create a successful encryption strategy. Major uses along withfactors to consider are presented for protecting storage management, datain-flight, and data at-rest. The session provides expanded coverage onencrypting data at-rest, including key management and a step-by-stepapproach. Learning Objectives
A Chief Information Security Officer's View of StorageSecurityDownloadThe CISO is accountable for the mitigation of risk. Their diligenceassures the success of their organization. While securing the storage in allof its forms may be tasks of the storage team, if that team fails, the CISOmay pay the price. C-Level Security Executives are leaders who set vision,choose information security models, define the security services, build ateam, manage budget, run the business and prepare for potential crisis’s allfor one purpose: to meet business and regulatory expectations. To understandthe CISO is to know what they value and what they expect. This session helps the storage professional understand the perspective ofthe security executive. How do they see storage risk? What is their approachto mitigation? We will examine how they challenge conventional wisdom andadapt while assessing threats, assets and vulnerabilities. Then we will lookat how they lead in the heat of an incident. Finally, we will providespecific recommendations and offer insight into the best ways for storageprofessionals to work with the security executive. After completing this tutorial, you should be able to:
|
LoginFeatured Events
|

