12 Reliable Secure Storage
12 Reliable Secure Storage
SIO
Pomnar, Ashok & Rajawat, Anand & Tatkar, Nisha & Bhaladhare, Pawan. (2023). Sustainable Power Prediction and Demand for Hyperscale Datacenters in India. 124. 10.3390/engproc2023059124.
• How:
̶ Data encrypted by databases engines, such as MySQL and Postgres
̶ Encrypted Storage Volumes, such as Bitlocker and Luks
̶ Filesystem features, such as in NTFS and EXT4
̶ Application Encryption, such as 7ZIP and Joplin
̶ Devices Encrypt data before writing to media
João Paulo Barraca, André Zúquete SIO 10
Data Encryption
Encrypted Volumes and Filesystems
• Popular solution supported in current systems with wide support
̶ Mandatory by current security practices
̶ Protects data from direct access to device
• Lost/stolen storage device or laptop
̶ File Based Encryption: encrypts files or folders
̶ Full Disk Encryption: encrypts the entire storage volume
XTS Mode:
• Solutions
̶ Firmware TPMs
̶ Integrated TPMs
̶ Use Boot PIN or Password: TPM will only provide key when unlocked
• Keys used
̶ KEK: Key Encryption Key (Authentication Key)
• Provided by the user. Digest stored in the Shadow Disk
̶ MEK (or DEK): Media (Data) Encryption Key
• Encrypted with the KEK
• Boot process
̶ BIOS will access Shadow Disk and boots
̶ Application in Shadow Disk requests password, decrypts KEK and verifies
hash(KEK)
̶ If it matches, MEK is decrypted, and disk geometry is updated
• Approach
̶ Access disks in parallel
̶ Striping: Data is split in small chunks (stripes)
• Stripes are stored among all disks in a distributed manner
• Advantages
̶ May speedup performance as a factor of the number of disks
• Disadvantages
̶ Increases the probability of loosing data
̶ If Pf is the probability of failure of a single disk, an N-disk RAID 0 volume will have a 1-(1-Pf)N failure probability
̶ Increases the number of devices
• At least it will double the number of devices required
• Approach
̶ Data duplication (mirroring)
• Synchronized writing
• Distributed read from any disk with or without comparison from another disk
• Advantages
̶ Decreases the probability of data loss
• If Pf is the probability of failure of a single disk, the probability of failure with N disks is PfN
• Disadvantages
̶ Storage inefficiency: Will lose at lease 50% of the total capacity
• For 3 disks it will lose 66%... Loss is (N-1)/N
̶ Increase the number of devices
• At least to the double
• Approach
̶ 0+1: A RAID 1 volume using RAID 0 volumes
• Mirroring of striped volumes
̶ 1+0: RAID 0 over RAID 1 volumes
• Striping over mirrored volumes
• Disadvantages
̶ Storage capacity waste
• At least 50%
̶ Increase the number of devices
• Approach
̶ Store data in N-1 disks
̶ Store parity data in an additional disk
• Total waste is dependent on the capacity and number of disks
• Data from any N-1 disk can be used to recreate another one
• Disadvantages
̶ Requires at least 3 disks
• Updating parity data is complex and will require specific hardware
• Imposes the need to read before any write
▪ Read data from existing block (e.g., C1) and from the corresponding parity disk (Cp)
▪ Compare old data block with new, and change the parity block (Cp’)
▪ Write the new data block (C1’) and the new parity block (Cp’)
• Writes must be serialized due to the existence of a parity disk
̶ Recovery is way more complex and slow than with RAID 1
João Paulo Barraca, André Zúquete SIO 19
Storage Resilience
RAID 5
• Objectives
̶ Similar to RAID 4
̶ But with higher write efficiency
• Approach
̶ Distribute the parity blocks among all disks
̶ Waste is similar to RAID 4
̶ Write concurrency is improved
• Disadvantages
̶ More complex to be implemented, typically requiring dedicated hardware
• Approach
̶ Use 2 parity blocks, distributed among all disks
̶ Capacity waste will be higher than in RAID 5 (equal to 2 disks)
̶ Concurrency is slightly worse than with RAID 5
• Advantages
̶ Allows the failure of two disks without data loss
• Disadvantages
̶ Even more complex than RAID 5
• Redundancy
• Deduplication
• Data protection
• Immutability
João Paulo Barraca, André Zúquete Paul Ruggiero, Matthew Heckathorn, Data Backup Options, US-CERT SIO 23
Backups
Properties: Availability
• The ability to quickly restore and access that when needed.
̶ Not a simple measure of the backup system availability (e.g. uptime)
• Recovery Time Objective (RTO): Maximum amount of time to restore a system or data after a
failure.
̶ A lower RTO indicates faster recovery and higher availability.
• Recovery Point Objective (RPO): Maximum amount of data that can be lost during a recovery
process.
̶ A lower RPO means less data is at risk of being lost.
• Backup Storage and Retrieval: The speed and ease of retrieving backups from storage solution
Recovery
Restoration Time
Point Disaster Objective
Hours
Downtime
Lost data
Recovery
Point
Objective
João Paulo Barraca, André Zúquete SIO 25
Backups
Redundancy
• How and how much are data objects duplicated in a backup strategy
• Best practices
̶ Data is compressed, and encrypted at the source (Encrypt Data at Rest)
• Backup keys are never stored in the backup data
̶ Backups are made through secure interfaces: VPNs (Encrypt Data in Transit) and dedicated links
̶ Backup location is carefully selected
• external provider location and jurisdiction
• Physical access controls
̶ Air Gaps
̶ Audit logs to help validate improper access to backups
̶ Backups are verified
• Write Once Read Many Storage (WORM): destination storage only allows appending data
̶ Writes or deletions are denied
̶ Frequently: access to data requires special set of Administration Keys
̶ Storage device acts as a secure storage
• and not a generic storage allowing full control
Shared Storage
Both the Servers and Backup Systems can access data, but cannot communicate
Backup Systems are protected from compromised server
Remote
Servers Backup Systems Backup Systems
Shared Storage
Both the Servers and Backup Systems can access data, but cannot communicate
Backup Systems are protected from compromised server
Remote Backup System is further isolated
João Paulo Barraca, André Zúquete SIO 32
Backups
Immutability – Air Gap using Secondary Replication and Manual Transport
Remote
Servers Backup Systems Backup Systems
Offline
Backup Systems
Shared Storage
Both the Servers and Backup Systems can access data, but cannot communicate
Backup Systems are protected from compromised server
Remote Backup System is further isolated
João Paulo Barraca, André Zúquete SIO 33
Backups
The 3-2-1 Rule
• Keep 3 copies of any important file: 1 primary and 2 backups.
• Limitations
̶ The notion of offsite was considered as a cloud, but systems already are in the cloud
̶ The notion of “different media” considered HDDs and tapes, but there are other options
̶ What about backup verification? How many errors can we have?
João Paulo Barraca, André Zúquete Paul Ruggiero, Matthew Heckathorn, Data Backup Options, US-CERT SIO 34
Backups
The 3-2-1-1-0 Rule
• Keep 3 copies of an important file
̶ Observe the consideration of “important”
http://www.teammead.co.uk/
http://www.teammead.co.uk/
• Aspects to consider
ꟷ Effectiveness of the method according to the media
ꟷ Audit Trail created
ꟷ Standard compliance
• NIS 800-88 r1
• IEEE 2883-2022
ꟷ Documentation: Destruction certificate