storage-technologies-unit-5
storage-technologies-unit-5
Unit V
Securing the Storage Infrastructure
Dr. A. Muthumari
Assistant Professor/CSE
Anna University Regional Campus Madurai
Module 6.1
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 3
Lesson 1: Defining Storage Security
Upon completion of this lesson, you will be able to:
Define storage security
Describe the three primary elements protected by
information-centric security
Name the three primary security attributes of a given
entity
Describe how and why security services are used to
protect information
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 4
What is Storage Security
The convergence of information
security, data storage, and
computer networking Security
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 5
Information Security – What is it?
Information Security
Protecting information and information
systems from unauthorized access, use,
disclosure, disruption, modification, or
destruction to provide:
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 6
Protecting People, Transactions, and Data
Information-Centric Security
Approaching Information Security as an Information Management
Problem
WAN
LAN Transactions
SAN
Enforce Policy in People, Transactions, Infrastructure, and Data
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 7
Security Attributes
Availability Confidentiality
Utility Possession
Accountability
Assurance
Integrity
Authenticity
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 8
Thinking about Security Threats
Threats Assets
Risk
Vulnerabilities
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 10
Security Services
We build controls using security services.
– Access Control
– Confidentiality
– Availability
➢ Timely and reliable access to data and information services
❖ Loss of availability == denial of service (DoS)
– Nonrepudiation
➢ Proof of participation (sender or receiver)
– Integrity
➢ Guarding against improper modification or destruction of data
❖ Also assures non-repudiation and authenticity
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 11
Access Control
Access control components:
➢ Identification:
❖ Recognition of an entity (user, process, role)
➢ Authentication
❖ Identification with some level of assurance (verification)
➢ Authorization
❖ Determine the access right of an entity
➢ Enforcement
❖ Actually enforces the access control decision
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 12
Confidentiality
Confidentiality
➢ Data Protection
❖ Act directly on the data (encryption)
➢ Data Separation
❖ prevent data from reaching an unauthorized location
➢ Traffic flow protection
❖ Hide source, destination, frequency, quantity, etc. of communication
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 13
Lesson Summary
Key points covered in this lesson:
Information security starts with people, data, and
transactions
– Actors, actions, and assets
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 14
Lesson 2. Developing a Storage Security Model
Upon completion of this lesson, you will be able to:
List the components of the SNIA shared storage model
Explain how to utilize the @Stake storage security model
to analyze a storage implementation
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 15
The SNIA Shared Storage Model:
Overview
Application
File/record layer
Storage domain
Services
Host
Network
Block
aggregation Device
Block layer
Source: SNIA Technical Council, Shared Storage Model, SNIA, April 2003, p.10
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 16
The SNIA Shared Storage Model:
Access Path
Application
File/record layer
Storage domain
Services
Host
Network
Block
aggregation Device
Block layer
Source: SNIA Technical Council, Shared Storage Model, SNIA, April 2003, p.10
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 17
Restricting Access Paths
Existence of an access path doesn’t imply permission to
use it!
We can enforce access in several places:
– The server (host)
– In the storage network (SAN, iSCSI, FCIP)
– At the storage devices
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 18
The @stake Security Storage Model
Application
File/record layer
Database File system
Management
(dbms) (FS)
Transport
Host
Network
Block
aggregation Device
Block layer
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 19
Layers of Security and the Shared Storage Model
Application Authentication
File/record layer
Authorization
Database File system
(dbms) (FS)
Auditing
Host Integrity
Network
Block
aggregation Device
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 21
Understanding Vulnerabilities
Attack surface: the available interfaces supported by a
component (software, hardware)
➢ E.g., Application server (network backup) allows unauthenticated
logins.
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 22
Lesson Summary
Key points covered in this lesson
The shared storage model includes the file/record layer,
the block layer, and the storage device layer, as well as
the interconnect and services layers.
The @stake storage security model explicitly adds
storage applications and storage management layers as
attack points
Identifying security elements at each layer help us identify
attack surfaces and track attack vectors that involve
multiple layers.
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 23
Lesson 3. Securing Data Storage
Upon completion of this lesson, you will be able to:
Describe three security domains for storage networking
List the various threats in each domain
Describe the controls that can be applied to mitigate
these threats
List various examples of these controls
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 24
Storage Security Domains
Management
Access
Backup,
Recovery & Archive
Application STORAGE
Access NETWORK Secondary
Storage
Data Storage
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 25
NIST Risk Assessment Methodology
1.System Characterization
2. Threat Identification
3. Vulnerability Identification Given that an attacker and a
vulnerability exist, then
4. Control analysis Risk = ƒ(likelihood * Impact)
5.Likelihood determination
6.Impact Analysis
7.Risk determination
8.Control Recommendations Special Publication 800-30: Risk Management
Guide for Information Technology Systems, NIST,
2002
9.Results Documentation
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 26
Security Elements for Each Domain
Existing Threats
Available Controls
Existing Solutions
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 27
Securing Application Access
Management
Access
Backup,
Recovery & Archive
Application STORAGE
Access NETWORK Secondary
Storage
Data Storage
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 28
Threats Against Application Access to Data
Host
Volumes
IP STORAGE
NETWORK Host NETWORK
Array
Host
Spoofing identity
Elevation of Spoofing identity Volumes
privilege Tampering with data
Network snooping Media
Host
Denial of service theft
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 29
Critical Functionality for Securing Application
Access
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 30
Controlling User Access to Data
✓ Strong authentication
✓ NAS: Access Control Lists
Examples
✓ Information Rights Management
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 31
Controlling Host Access to Data
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 32
Protecting Storage Infrastructure
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 33
Protecting Data at Rest
Management
Access
Backup,
Recovery & Archive
Application STORAGE
Access NETWORK Secondary
Storage
Data Storage
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 35
Threats Against Management Access to Data
Storage Infrastructure
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 36
Critical Functionality for Securing Management
Access
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 37
Controlling Administrator Access
Management
Access
Backup,
Recovery & Archive
Application STORAGE
Access NETWORK Secondary
Storage
Data Storage
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 40
Threats Against Backup, Recovery, and Archive
Media theft
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 41
Protecting Secondary Storage and Replication
Infrastructure
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 43
✓ Check Your Knowledge
What are the three entities that information-centric
security protects?
What are the three primary security attributes?
What are the primary elements of the shared storage
model?
What are the security elements that any system must
have?
What are the three data security domains?
What are the two primary security service for protecting
information within a storage network?
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 44
Module Summary
Key points covered in this module:
Storage security combines storage technologies,
networking, and information security.
– Protect the confidentiality, availability, and integrity of the storage
network components and the information that they transmit or store
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 45
✓ Apply Your Knowledge
Upon completion of this topic, you will be able to:
List a selection of EMC’s products and services in
Information Security
Describe the Assess-Secure-Assure Cycle
Identify some key EMC products for authentication
Identify some key EMC products for data protection
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 46
EMC Information Security Services
Assess Risk
• Assessment Service for Storage Security Secure Data
▪ Classification for Information Security ▪ Design and Implementation
for Storage Encryption
▪ EMC Certified Data Erasure
▪ EMC Disk Retention
Secure Identities, Access & ▪ SAN Security
Infrastructure
▪ Authentication Strategy
▪ Identity and Access Management Strategy
▪ Secure Remote Support Gateway
▪ Symmetrix Secure Credentials &
Assure Compliance
Tamperproof Audit Log ▪ Compliance Assessment
▪ Design and Implementation for Security
Information Management
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 47
Identity and Access Management
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 48
Securing Identities and Access: Example
Secure Remote Support
Gateway enables authentication Secure Identities, Access &
for managed devices Infrastructure
– RSA SecurID authenticates CE
login to EMC remote support ▪ Secure Remote Support Gateway
infrastructure ▪ Symmetrix Secure Credentials
– X.509 certificates provide
authenticated access to the
gateway device via SSL
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 49
Data Security Vulnerabilities
1
traffic
Tape
library Tape
library
Primary Physical
3 Offsite tape storage Backup
media
data data
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 50
Using Encryption to Secure Your Tape Archives
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 51
Using Encryption to Secure Data During
Replication
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 52
Using Encryption to Secure Data on Physical
Media
Data Center
SAN
Sensitive data
NeoScale Encrypted data destined for
CryptoStor Fibre repair operations, data
Channel Disk migrations, or disposal
Protection
Appliance
© 2007 EMC Corporation. All rights reserved. Securing the Storage Infrastructure - 53