Technology Communities |
SecurityMaterial on this page is intended solely for the purpose of content review by SNIA members. Tutorial material may be read and commented upon by any SNIA member, but may not be saved, printed, or otherwise copied, nor may it be shared with non-members of the SNIA. Tutorial managers are responsible for responding to all comments made during the open review period. No responses will be given to comments made outside the open review period. Jump straight to an abstract:
The Abstracts
Storage Security Tutorial With a Focus on Cloud Storage Introduction of computing and data services in a virtualized and service provider context exposes the customer's information to a new set of threats and vulnerabilities. This session provides an introduction to those threats and what techniques are available to mitigate the threats. Learning Objectives
Securing the Cloud - Using Encryption and Key Management to Solve Today's Cloud Security Challenges Moving to "The Cloud" is viewed as a path that most companies believe they will head down over the next several years. However, concern around security is the number one barrier to cloud adoption. Encryption and Key Management are important technologies that can help secure applications and data in the cloud. Companies considering moving to a cloud based infrastructure need to understand various aspects of encryption and key management - regulations guiding their use, the impact of key expiration and rotation on application performance and backup / restore / archiving, hardware versus software key management and retaining control of keys when applications and data are with a Cloud Service Provider. We will discuss industry best practices around encryption and key management, look at how various existing solutions fare on these considerations, and look at emerging solutions in this space Learning Objectives
Legal Issues Relevant to Storage Many organizations face the challenge of implementing protection and data security measures necessary to comply with a wide range of regulatory, statutory, and other legal requirements. Because storage systems (actually the data they contain) play an important part in many of these issues, storage managers and administrators may be asked to assist in supporting a variety of legal actions as well as help their organizations guard against data transgressions having legal consequences. Thus, they need to be capable of taking abstract regulatory, statutory and other legal requirements and translating them into implementable solutions. In addition, they must be able to partner with the legal community to ensure these solutions address the organization's compliance requirements and that the support is timely and responsive. This session describes the legal issues storage security professionals are likely to encounter as part of their role as the focal point for securing storage systems
SNIA Storage Security Best Practices With the increasing importance and emphasis on security in mind, the Storage Networking Industry Association (SNIA) had developed and published (see http://www.snia.org/forums/ssif/programs/best_practices/) a set of storage security best current practices (BCPs). This vendor neutral guidance has a broad scope, covering both storage systems and entire storage ecosystems. Specific elements include, but are not limited to, storage management, protocols, compliance, encryption, key management, and long-term archive. This session provides an introduction to the BCPs as well as information that that will help organizations exploit the BCPs in their own environments. Learning Objectives
Self-Encrypting Drives: Simple, Yet Powerful Data security is top of mind for most businesses trying to respond to the constant barrage of news highlighting data theft, security breaches, and the resulting punitive costs. Combined with litigation risks, compliance issues and pending legislation, companies face a myriad of technology and products that all claim to protect data-at-rest on storage devices. The drive industry has standardized and is now deploying, innovative, simple yet powerful technology intended to secure data where it lives – in storage. This tutorial will give storage users and managers a look at emerging drive-level self-encryption technology (both HDD and SSD) from notebook PCs to the data center that provides a more secure storage foundation and compare that technology with alternate storage encryption methods, including: host-based, appliance, network fabric, and controller-based. Self-encryption will be compared to software-based encryption in several aspects, including performance. Independent side-by-side performance testing of both HDDs and SSDs demonstrates dramatically the superior read/write/startup capabilities of self-encrypting drives. Learning Objectives
ABCs of Data Encryption for Storage Learning Objectives
An Introduction to Storage Security As society becomes more dependent on IT and digital assets, the social impact of the failure of IT resources ceases to be an inconvenience and begins to take on the character of a disaster. Few other elements of the IT infrastructure have a more important relationship with data than that of storage systems. They may also be the last line of defense against an adversary, but only if storage managers and administrators invest the time and effort to implement and activate the available storage security controls. This session covers the storage security fundamentals. It starts by providing information on the types of data that should be protected along with the drivers for this protection. Next, it summarizes important information assurance and security concepts, with a particular emphasis on risk. It continues with a characterization of storage security and concludes with practical guidance on starting a storage security program. Learning Objectives
Cryptography Deciphered
|
LoginFeatured Events
|

