Best Practices For Storage Networks
Best Practices For Storage Networks
18 October 2007
Table of Contents
1. Executive Summary .................................................................................................... 1
2. General Storage Network Security ............................................................................. 2
2.1 Physical Security, Operations Security, and Business Continuity Planning ........ 2
2.2 Documentation and Planning................................................................................ 3
2.3 Availability and Confidentiality ........................................................................... 3
2.4 Network Management and Access Control .......................................................... 3
2.5 Layer 2-3 Security................................................................................................. 4
2.6 Operating System and Application Security......................................................... 5
2.7 Attack Detection and Prevention .......................................................................... 5
3. Network Attached Storage (NAS) Security................................................................ 6
3.1 Confidentiality and Integrity................................................................................. 6
3.2 Network Data Management Protocol (NDMP) .................................................... 6
3.3 Authentication and Access Control ...................................................................... 6
3.3.1 Data Segmentation ......................................................................................... 6
3.3.2 CIFS ............................................................................................................... 7
3.3.3 NFS ................................................................................................................ 7
3.4 Sample NAS Security Architecture ...................................................................... 7
4. Storage Area Network (SAN) Security....................................................................... 9
4.1 Confidentiality ...................................................................................................... 9
4.2 Authentication....................................................................................................... 9
4.3 Access Control .................................................................................................... 10
4.3.1 Zoning .......................................................................................................... 10
4.3.2 LUN Masking .............................................................................................. 10
4.3.3 Node Identification ...................................................................................... 11
4.3.4 Proprietary Access Control Cisco Virtual SAN (VSAN) ......................... 11
4.3.5 Cut-through Switching, Physical Port Locking, and Port Type Locking .... 11
4.3.6 Name Server................................................................................................. 12
4.4 Sample SAN Security Architecture .................................................................... 12
5. Internet Small Computer Systems Interface (iSCSI) Security.................................. 14
5.1 Confidentiality and Integrity............................................................................... 14
5.2 Authentication..................................................................................................... 14
5.3 Internet Storage Name Server (iSNS) Best Practices ......................................... 14
5.4 Sample iSCSI Security Architecture................................................................... 15
6. Conclusions............................................................................................................... 16
Appendix 1 - Acronyms................................................................................................ 17
Appendix 2 General Storage Network Best Practices Summary............................... 19
Appendix 3 NAS Best Practices Summary................................................................ 21
Appendix 4 SAN Best Practices Summary................................................................ 23
Appendix 5 iSCSI Best Practices Summary .............................................................. 25
Appendix 6 - References............................................................................................... 26
1. Executive Summary
Storage networks often contain company proprietary information, trade secrets, and
mission critical data. Ensuring the availability of the storage network and its components as well
as the confidentiality and integrity of information in transit and at rest within the storage network
is vital to the success of the company. Implementing the common best practices described in this
paper will provide greater information assurance for the storage architecture and data within the
storage network.
This paper will present general storage network security best practices followed by
specific best practices for Network Attached Storage (NAS), Storage Area Networks (SAN), and
Internet Small Computer Systems Interface (iSCSI) storage networks. Included are security
mechanisms that should be used to protect the content and function of storage networks.
Techniques that employ these mechanisms will protect the components, interfaces, and protocols
in storage networks and will provide fewer opportunities for attack. Sample architectures that
incorporate many of the security features are also provided.
band (OOB) management and only use protocols that incorporate strong encryption (i.e. current,
patched versions of SSH or SSL). The OOB management network should not be connected to
any other network, including the Internet. A less secure remote management option would be inband management using only protocols that incorporate strong encryption. Regardless of remote
management type (i.e. in-band or OOB), storage network administrative access should be
restricted via access control lists to a minimal set of Internet Protocol (IP) addresses if possible.
Insecure protocols such as TELNET, FTP, RSH, and HTTP should be disabled. A modem should
never be connected to the serial port for remote management.
Access control lists should restrict any Simple Network Management Protocol (SNMP)
traffic sent from unauthorized devices. SNMP version 3 (SNMPv3) should be used rather than
SNMPv1 or SNMPv2. SNMP communications should be logged.
All management passwords and SNMP community strings should comply with strong
rules set forth in policy. Administrators should use unique passwords, should regularly change
their passwords in accordance with password expiration policy, and should not reuse old
passwords. Always change device default passwords before connecting to an operational or
management network. Two or more-factor authentication should be required for administrators
of each of the components in the storage network.
Use Role-Based Access Control (RBAC) if it is available to manage storage network
devices. RBAC provides much granularity in defining different administrative operations and
associating these operations with different administrators. Administrators will only be able to
perform those operations required to satisfy their job responsibilities.
Access Control mechanisms should record login failures. Perform periodic audits to look
for patterns of failed login events, since this might be evidence of attempted unauthorized access.
Another best practice for access control is to close all terminal shell windows and log out
of the administrative workstation immediately after performing administrative tasks on storage
network devices. Also, after using the serial port on a storage network device to manage the
device, log out of the device before physically unplugging the cable from the serial port.
Following this practice will prevent unauthorized automatic serial port access.
Separate NAS devices should be used for each group or level of security classification e.g. one
NAS device for unclassified data, a separate NAS device for confidential data, and so on.
3.3.2 CIFS
A NAS device running CIFS can be made more secure by employing New Technology
Local Area Network Manager version 2 (NTLMv2) or Kerberos authentication mechanisms. For
instance, NTLMv2 should be used for a medium level of authentication assurance, while
Kerberos is most appropriate for environments where a high level of authentication assurance is
required. Use mutual Kerberos authentication if possible, because it is the authentication of each
device to the other, and this is more secure than one-way authentication (i.e. one device
authenticates itself to the other device). Weak authentication mechanisms such as LAN Manager
(LM) and NTLMv1 should always be disabled on all Windows domain controllers and clients.
An IDS should be used to alert on LM and NTLMv1 to detect attempts to authenticate using a
weaker form of authentication. If Kerberos is used, alerts should also be generated for NTLMv2
authentication attempts to indicate that NTLMv2 authentication was attempted rather than the
stronger Kerberos authentication. Another CIFS NAS best practice is to restrict share
permissions to specific users and groups. This provides a form of access control to NAS data.
3.3.3 NFS
A NAS device running NFS can be made more secure by employing Kerberos
authentication mechanisms. Use NAS client operating systems that support Kerberos for
authentication. Establish privileged user accounts and associate them with specific IP addresses.
Log and ignore requests from privileged users at unauthorized IP addresses. When a client makes
a request to a NAS device from the root account, the device should treat the request as being
from the nobody account. Use export options appropriately on all NAS devices to help ensure
that data is only accessible to devices that are authorized to receive the data. Configure NAS
devices to log and ignore showmount requests. If responses must be sent, create local
hostname aliases and configure exports to those aliases to obscure the information an attacker
can enumerate when making showmount requests.
IP Out-of-Band
Management, Logging,
& NTP Source Network
NAS
SSH
SSL
SNMPv3
NAS
SYSLOG
Logical Network
Connection
NTP
Encryption
Device
Device End-to-End
IPSec Encryption
(encryption not shown but
does occur within clouds)
Kerberos
NIDS
NIDS
End-User
Network
KDC
DMZ
Network
Internet
4.1 Confidentiality
Confidentiality services help guarantee the privacy of data, by using advanced encryption
techniques, to ensure only authorized individuals see the information. Confidentiality of data and
metadata can be provided with a number of mechanisms. Equipment that supports the Fibre
Channel Security Protocols (FC-SP) should be selected and properly configured for use
throughout the SAN. FC-SP provides Fibre Channel frame confidentiality through the use of
ESP encryption. In addition to FC-SP, encrypt inter-switch communications using a strong
cryptographic algorithm. Enable and use protocols that provide strong cryptography for switch
administration and management (e.g. SSH, SSL, SNMPv3) to protect network traffic that
contains passwords.
Data-at-rest on storage devices such as disks or tapes should be encrypted using a strong
cryptographic algorithm. Encryption appliances are commercially available that perform this
function. However, typically the encryption device does not encrypt data between the servers and
the SAN switches, but rather between the switches and the storage devices. Ideally, encryption
would occur at the server so that data is encrypted (i.e. confidentiality is maintained) from server
to SAN switch to storage device (i.e. wherever it is in transit on the SAN) and when it is at rest
on the storage devices.
4.2 Authentication
Authentication can be provided in numerous ways. In order to limit the attackers ability
to enumerate the SAN, choose Fibre Channel switches that require authentication before
allowing a connection to a management interface. Authentication should be used to prevent
masquerading and Denial-of-Service (DoS) attacks. Switches connect to each other in a SAN via
E-ports. Authentication should be performed between switches to prevent the loss of fabric
information via an E-port connection to a rogue SAN switch. For architectures requiring the
most secure level of security assurance, disable E-port replication (i.e. automatic transfer of
fabric information to any connected switch). Any of the following authentication mechanisms
may be present in a given piece of equipment. The most secure authentication features that are
available should be used.
The FC-SP standard mechanism for switches to authenticate to each other is the DiffieHellman Challenge Handshake Authentication Protocol (DH-CHAP). It must be implemented in
FC-SP compliant implementations, and it must be configured to function properly within the
SAN architecture. SHA-1 is stronger than MD5, so SHA-1 should be chosen as the DH-CHAP
hash algorithm. Additionally, whenever a DH-CHAP challenge is sent, ensure that it is unique.
The Fibre Channel Authentication Protocol (FCAP) and Fibre Channel Password
Authentication Protocol (FCPAP) are optional authentication mechanisms that are part of the
FC-SP framework. FCAP is a digital certificate-based mechanism. FCPAP is a password-based
mechanism. FCAP and FCPAP should be used when available. Vendors might choose to
implement an authentication protocol that is not FC-SP compliant. For instance, Brocade offers a
proprietary authentication protocol in its secure Fabric OS known as Switch Link Authentication
Protocol (SLAP). SLAP is a digital certificate-based mechanism. Vendor proprietary
authentication mechanisms should be used when no alternative FC-SP mechanisms are available.
If FC-SP and proprietary mechanisms are available, implement the strongest mechanisms.
Authentication of administrative traffic to management ports on SAN equipment is also
important. If possible, management should be done out-of-band using an IP management
network that has no connectivity to the Internet or other networks. However, if this is not
feasible, use the Common Transport (CT) Authentication protocol (which is part of FC-SP) to
authenticate in-band (Fibre Channel) network management communications.
10
mechanism can be implemented at different points in the SAN. Implement LUN masking on the
storage devices for the highest level of security assurance. Implement LUN masking on SAN
switches for a medium level of security assurance. Do not configure LUN masking at the servers
since this is the least secure location for implementing LUN masking. LUN masking software is
more vulnerable to attack if it is located on servers rather than the switches or storage devices,
since the servers are probably more accessible to attackers than switches and storage devices.
The more accessible the LUN masking mechanism is on the network, the more vulnerable the
SAN is to attack.
4.3.3 Node Identification
A network node is any entity that is connected to the network and is addressable. There
are different ways to address network nodes. Thus, there are different ways to identify nodes,
particularly when implementing LUN masking or a zoning mechanism that is WWN-based.
These different forms of node identification provide different levels of security. Use World Wide
Port Name (WWPN) + World Wide Node Name (WWNN) for authorization when possible to
identify nodes for LUN masking and WWN zoning. This is the most secure form of node
identification and will help to prevent LUN masking attacks. Port WWN alone will provide less
security assurance, if you can verify with the vendor or by some other means that the software
only checks port WWN rather than checking either port or node WWN. Node WWN alone
should never be used since it is easily spoofed and therefore insecure.
4.3.4 Proprietary Access Control Cisco Virtual SAN (VSAN)
Use proprietary access controls when they are available to help secure the SAN, e.g.
Cisco Virtual SANs (VSANs), which are similar to VLANs. When properly configured, VSANs
can help mitigate certain attacks, including zone hopping, WWN spoofing, and LUN masking
attacks. Care should be taken when determining what type of VSAN to implement. Static
VSANs are configured according to physical switch port numbers, and are more secure than
dynamic VSANs, which are configured based on port WWN or node WWN. Avoid dynamic
VSANs if possible, but if they must be used, prefer port WWN-based dynamic VSANs.
4.3.5 Cut-through Switching, Physical Port Locking, and Port Type Locking
Access Control can also be provided by disabling or using different SAN switch features
such as cut-through switching, physical port locking, and port type locking. These features
specify both physical switch port and traffic switching controls. Cut-through switching is a
method of switching traffic that offers performance gains, but at the cost of reduced security. If
cut-through switching is an option on a SAN switch, disable it.
Physical port locking, also referred to as port binding, is similar to port security on Cisco
LAN switches, and should be used when available. It associates a particular WWN with a
specific physical port. It should be used for all connected ports on a SAN switch (i.e. not just
some connected ports).
Port type locking allows the SAN administrator to specify what type of device (e.g.
switch, HBA) should be connected to each port on the switch by locking ports to port types (e.g.
11
E-port, F-port). All major Fibre Channel switch vendors support port type locking, so it should
be used to help mitigate E-port replication attacks.
4.3.6 Name Server
Access Control techniques apply to name server practices as well. Each SAN switch has
a name server, and name server information is synchronized among the switches in a SAN
fabric. The purpose of the name server is to provide SAN nodes with addresses of other nodes
within the fabric. Name server replies should only be sent to requests from authorized nodes in a
given zone. This will help to prevent enumeration, name server corruption, and zone hopping
attacks.
12
Ethernet connection
Fiber connection
End-User
Network
NIDS
FC
FC
HBA
HBA
DMZ
Network
Disaster Recovery
Network
NIDS
Internet
DH-CHAP
SSH
Encryption
Device
WWPN
+ WWNN
LUN
Masking
SSL
SNMPv3
NTP
IP Out-of-Band
Management, Logging,
& NTP Source Network
SYSLOG
WWPN
+ WWNN
LUN
Masking
13
5.2 Authentication
Challenge Handshake Authentication Protocol (CHAP) is a protocol that will allow an
iSCSI device to authenticate to another iSCSI device. Although the CHAP protocol has
weaknesses, some implementations of CHAP are more secure than others. A best practice is to
choose devices that implement a relatively secure implementation of CHAP and enable it for use
in the iSCSI architecture.
The following items should be considered before purchasing a CHAP solution to ensure
that the implementation is relatively secure. CHAP challenges should not be repeated. A unique
challenge should be sent each time. When an iSCSI target storage device sends a challenge, if it
receives the same challenge back before getting a correct response, it should ignore and log the
challenge.
CHAP can be implemented as either one-way CHAP or as mutual CHAP. Using an
iSCSI client and a storage device as an example, one-way CHAP only authenticates the iSCSI
client to the storage device. Mutual CHAP authenticates an iSCSI client to a storage device as
well as authenticates the storage device to the iSCSI client. Use mutual CHAP authentication for
a medium-high level of authentication assurance. One-way CHAP authentication provides a
lower level of authentication assurance.
should be created, and whenever a new node connects to the network, it should be placed in an
untrusted domain until security mechanisms are applied to the new node.
iSNS communications should be secured. The confidentiality and integrity of unicast
messages should be protected using IPSec. Broadcast and multicast communications should be
authenticated with a Public Key Infrastructure (PKI).
End-User
Network
NIDS
iSCSI
Initiator
iSCSI
Storage
Router
iSCSI
Initiator
DMZ
Network
NIDS
Internet
SSH
SSL
SNMPv3
NTP
IP Out-of-Band
Management, Logging,
& NTP Source Network
SYSLOG
FC
Storage
Devices
15
6. Conclusions
Best practices for securing storage networks were presented in this document. General
storage network security was discussed, followed by a presentation of best practices for three
distinct storage technologies: Network Attached Storage (NAS), Storage Area Networks (SAN),
and Internet Small Computer Systems Interface (iSCSI). Diagrams were offered that show each
of the three types of storage networks with security mechanisms incorporated into the networks.
The best practices outlined in this paper will provide administrators with the information
they need to strengthen their storage networks. Using mechanisms that provide authentication,
access control, confidentiality, and data integrity will make it harder for attackers to use
malicious code to take advantage of functionality errors or protocol faults within the storage
networks. Implementing the best practices described in this paper will help protect the content
and function of NAS, SAN and iSCSI storage networks and provide a sufficient level of
information assurance for most storage architectures.
16
Appendix 1 - Acronyms
ACL Access Control List
AES Advanced Encryption Standard
AH Authentication Header
ARP Address Resolution Protocol
CHAP Challenge Handshake Authentication Protocol
CIFS Common Internet File System
CRC Cyclic Redundancy Check
CT Common Transport
DES Data Encryption Standard
DH-CHAP Diffie-Hellman Challenge Handshake Authentication Protocol
DMZ Demilitarized Zone
DoS Denial-of-Service
EAL Evaluation Assurance Level
ESP Encapsulating Security Payload
FC-SP Fibre Channel Security Protocols
FCAP Fibre Channel Authentication Protocol
FCP Fibre Channel Protocol
FCPAP Fibre Channel Password Authentication Protocol
FIPS Federal Information Processing Standards
FTP File Transfer Protocol
HBA Host Bus Adapter
HIDS Host-based Intrusion Detection System
HTTP Hypertext Transfer Protocol
IDS Intrusion Detection System
IP Internet Protocol
IPSec IP Security
iSCSI Internet Small Computer Systems Interface
iSNS Internet Storage Name Server
KDC Key Distribution Center
LAN Local Area Network
LM LAN Manager
LUN Logical Unit Number
MAC Media Access Control
MD5 Message Digest 5
NAS Network Attached Storage
NDMP Network Data Management Protocol
NFS Network File System
NIDS Network-based Intrusion Detection System
NTLMv1 New Technology Local Area Network Manager version 1
NTLMv2 New Technology Local Area Network Manager version 2
NTP Network Time Protocol
OOB Out-of-band
17
18
Security Services
Provided
AC, Avail, C, I
AC, Avail
Avail
Avail
AC
Auth
AC, Avail, I
AC
AC
AC
AC
AC, Avail, C, I
AD
C, I
Avail, C
I
I
AD, I
AD
AD
AC
20
Security Services
Provided
C, I
C
Auth
AC
AC
AD, Auth
AC, C
Auth
AC, C
AC, C
AC, C
21
AC, C
22
Security Services
Provided
C
C
C
Auth
C
Auth
Auth
Auth
Auth
Auth
AC, Avail, C, I
AC
AC, I
23
AC, C
AC
AC
I
AC
AC, C
C
24
Security Services
Provided
I
C
Auth
Auth
AC, C, I
AC
C, I
Auth
25
Appendix 6 - References
[1]
Beauchamp and Judd, Kuo (contributor) 2001. Building SANs with Brocade Fabric
Switches: How to Design, Implement, and Maintain Storage Area Networks (SANs) with
Brocade Fabric Switches. Syngress Publishing, Inc.
[2]
[3]
Dwivedi, H. 2006. Securing Storage: A Practical Guide to SAN and NAS Security.
Pearson Education, Inc. (Addison-Wesley)
[4]
Chirillo and Blaul 2003. Storage Security: Protecting SANs, NAS, and DAS. Wiley
Publishing, Inc.
[5]
[6]
[7]
[8]
[9]
Storage Networking Industry Association 2005. Audit Logging for Storage: A SNIA
Security White Paper.
[10]
[11]
[12]
Cisco Storage Networking Fundamentals for the End User, Student Guide, Version 2.0
[13]
[14]
[15]
26