SlideShare a Scribd company logo
2
Most read
7
Most read
8
Most read
UNIT V
SECURING STORAGE INFRASTRUCTURE
SECURING STORAGE INFRASTRUCTURE
Information security goals, Storage security domains, Threats to a
storage infrastructure,Security controls to protect a storage
infrastructure, Governance, risk, and compliance,Storage
infrastructure management functions, Storage infrastructure
management processes.
All information security measures try to address at least one of three goals:
Protect the confidentiality of data
Preserve the integrity of data
Promote the availability of data for authorized use
• These goals form the confidentiality, integrity, availability (CIA), the basis
of all security programs.
• In order to identify the threats that apply to a storage network, access
paths to data storage can be categorized into three security domains:
 Application access,
management access, and
BURA (backup, recovery, and archive).
• The application access domain may include only those applications that
access the data through the file system or a database interface.
• Management Access to storage and interconnecting devices and to the data
residing on those devices. Management access, whether monitoring,
provisioning, or managing storage resources, is associated with every
device within the storage environment.
• Backup, Replication, and Archive Access primarily accessed by storage
administrators who configure and manage the environment. Along with the
access points in this domain, the backup and replication media also needs to
be secured.
• Figure 15-2 shows application access in a storage networking environment. Host A can access all
V1 volumes; host B can access all V2 volumes.
 These volumes are classified according to access level, such as confidential, restricted, and public.
Some of the possible threat in this scenario could be host A spoofing the identity or elevating the
privileges of host B to gain access to host B’s resources.
 Another threat could be an unauthorized host gain access to the network; the attacker on this host
may try to spoof the identity of another host and tamper with data, snoop the network, or execute a
DoS attack.
 Also any form of media theft could also compromise security.
SECURING THE APPLICATION ACCESS DOMAIN
unit 5-SECURING STORAGE INFRASTRUCTURE.PPT
SECURING THE MANAGEMENT ACCESS DOMAIN
• Management access, whether monitoring, provisioning, or managing storage resources, is
associated with every device within the storage network.
• Figure 15-3 depicts a storage networking environment in which production hosts are connected to a
SAN fabric and are accessing storage Array A, which is connected to storage Array B for replication
purposes.
• Further, this configuration has a storage management platform on Host B and a monitoring console
on Host A.
SECURING BACKUP, RECOVERY, AND ARCHIVE (BURA)
• BURA is the third domain that needs to be secured against attack. A backup involves copying the
data from a storage array to backup media, such as tapes or disks.
• Securing BURA is complex and is based on the BURA software accessing the storage arrays.
• Figure 15-4 illustrates a generic remote backup design whereby data on a storage array is
replicated over a disaster recovery (DR) network to a secondary storage at the DR site.

More Related Content

PPTX
Chapter 15
PPTX
Database Security
PPTX
Database security in database management.pptx
PPTX
18CSE442 Cloud Security Introduction SRM.pptx
PDF
IA 124 Lecture 01 2022 -23-1.pdf hahahah
PPTX
Unit -3.pptx cloud Security unit -3 notes
PPTX
Information systems security chapter (5).pptx
PPT
ELNA6eCh24.ppt
Chapter 15
Database Security
Database security in database management.pptx
18CSE442 Cloud Security Introduction SRM.pptx
IA 124 Lecture 01 2022 -23-1.pdf hahahah
Unit -3.pptx cloud Security unit -3 notes
Information systems security chapter (5).pptx
ELNA6eCh24.ppt

Similar to unit 5-SECURING STORAGE INFRASTRUCTURE.PPT (20)

PDF
Cyber security
PPT
legal and ethical.ppt
PPTX
Adbms 46 security and integrity of databases
PPT
Dbms ii mca-ch12-security-2013
PPTX
database Security for data security .pptx
PPTX
Data base security & integrity
PPTX
Strategies for Developing Breach Resilient Data Lakes
PDF
Computer Network Security study mate.pdf
PDF
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
PDF
Ensuring secure transfer, access and storage over the cloud storage
PDF
Ensuring secure transfer, access and storage over the cloud storage
PPTX
Database security
PPTX
Database Security, Threats & Countermeasures.pptx
PPT
Lecture 01- What is Information Security.ppt
PPTX
Dummy+SAR+Summary+Report_Final__1.0.pptx
PPTX
cloud computing security, risks, pros and cons, risk mitigation, challenges
PPTX
cloud computing and data security, content level security, pros and cons
PPTX
Database security
PDF
Iaetsd secure data storage against attacks in cloud
PDF
Locking Down Your Data: Best Practices for Database Security
Cyber security
legal and ethical.ppt
Adbms 46 security and integrity of databases
Dbms ii mca-ch12-security-2013
database Security for data security .pptx
Data base security & integrity
Strategies for Developing Breach Resilient Data Lakes
Computer Network Security study mate.pdf
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
Database security
Database Security, Threats & Countermeasures.pptx
Lecture 01- What is Information Security.ppt
Dummy+SAR+Summary+Report_Final__1.0.pptx
cloud computing security, risks, pros and cons, risk mitigation, challenges
cloud computing and data security, content level security, pros and cons
Database security
Iaetsd secure data storage against attacks in cloud
Locking Down Your Data: Best Practices for Database Security
Ad

More from Dss (10)

DOC
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
PPTX
SoT unit-4-BACKUP, ARCHIVE AND REPLICATION
PPTX
UNIT-III STORAGE Networking Technologies .PPT
PPTX
UNIT II INTELLIGENT STORAGE SYSTEMS AND RAID.pptx
PPTX
CCS367-STORAGE TECHNOLOGIES-UNIT -I.pptx
DOCX
CCS367- STORAGE TECHNOLOGIES SYLLABUS.docx
PPT
CLOUD COMPUTING.ppt
PDF
CCS367-Storage-Technologies-Lecture-Notes-1.pdf
PDF
Cs6402 apr may 2015
DOCX
Unit iv permutations and combinations
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
SoT unit-4-BACKUP, ARCHIVE AND REPLICATION
UNIT-III STORAGE Networking Technologies .PPT
UNIT II INTELLIGENT STORAGE SYSTEMS AND RAID.pptx
CCS367-STORAGE TECHNOLOGIES-UNIT -I.pptx
CCS367- STORAGE TECHNOLOGIES SYLLABUS.docx
CLOUD COMPUTING.ppt
CCS367-Storage-Technologies-Lecture-Notes-1.pdf
Cs6402 apr may 2015
Unit iv permutations and combinations
Ad

Recently uploaded (20)

PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Construction Project Organization Group 2.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Digital Logic Computer Design lecture notes
PDF
PPT on Performance Review to get promotions
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Welding lecture in detail for understanding
PPT
Project quality management in manufacturing
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Construction Project Organization Group 2.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Foundation to blockchain - A guide to Blockchain Tech
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Digital Logic Computer Design lecture notes
PPT on Performance Review to get promotions
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Mechanical Engineering MATERIALS Selection
Lecture Notes Electrical Wiring System Components
Internet of Things (IOT) - A guide to understanding
Welding lecture in detail for understanding
Project quality management in manufacturing
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Embodied AI: Ushering in the Next Era of Intelligent Systems
CYBER-CRIMES AND SECURITY A guide to understanding
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx

unit 5-SECURING STORAGE INFRASTRUCTURE.PPT

  • 1. UNIT V SECURING STORAGE INFRASTRUCTURE
  • 2. SECURING STORAGE INFRASTRUCTURE Information security goals, Storage security domains, Threats to a storage infrastructure,Security controls to protect a storage infrastructure, Governance, risk, and compliance,Storage infrastructure management functions, Storage infrastructure management processes.
  • 3. All information security measures try to address at least one of three goals: Protect the confidentiality of data Preserve the integrity of data Promote the availability of data for authorized use • These goals form the confidentiality, integrity, availability (CIA), the basis of all security programs.
  • 4. • In order to identify the threats that apply to a storage network, access paths to data storage can be categorized into three security domains:  Application access, management access, and BURA (backup, recovery, and archive).
  • 5. • The application access domain may include only those applications that access the data through the file system or a database interface. • Management Access to storage and interconnecting devices and to the data residing on those devices. Management access, whether monitoring, provisioning, or managing storage resources, is associated with every device within the storage environment. • Backup, Replication, and Archive Access primarily accessed by storage administrators who configure and manage the environment. Along with the access points in this domain, the backup and replication media also needs to be secured.
  • 6. • Figure 15-2 shows application access in a storage networking environment. Host A can access all V1 volumes; host B can access all V2 volumes.  These volumes are classified according to access level, such as confidential, restricted, and public. Some of the possible threat in this scenario could be host A spoofing the identity or elevating the privileges of host B to gain access to host B’s resources.  Another threat could be an unauthorized host gain access to the network; the attacker on this host may try to spoof the identity of another host and tamper with data, snoop the network, or execute a DoS attack.  Also any form of media theft could also compromise security. SECURING THE APPLICATION ACCESS DOMAIN
  • 8. SECURING THE MANAGEMENT ACCESS DOMAIN • Management access, whether monitoring, provisioning, or managing storage resources, is associated with every device within the storage network.
  • 9. • Figure 15-3 depicts a storage networking environment in which production hosts are connected to a SAN fabric and are accessing storage Array A, which is connected to storage Array B for replication purposes. • Further, this configuration has a storage management platform on Host B and a monitoring console on Host A.
  • 10. SECURING BACKUP, RECOVERY, AND ARCHIVE (BURA) • BURA is the third domain that needs to be secured against attack. A backup involves copying the data from a storage array to backup media, such as tapes or disks. • Securing BURA is complex and is based on the BURA software accessing the storage arrays.
  • 11. • Figure 15-4 illustrates a generic remote backup design whereby data on a storage array is replicated over a disaster recovery (DR) network to a secondary storage at the DR site.