Storage Security and Management: Security Framework

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Storage Security and Management
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Lecture 1: Overview modified from slides of Lawrie Brown.
Security Issues and Challenges in Cloud Computing
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 An Overview of Computer Security computer security.
Chapter 7 HARDENING SERVERS.
Introducing Computer and Network Security
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Lecture 11 Reliability and Security in IT infrastructure.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
© 2009 EMC Corporation. All rights reserved. Securing the Storage Infrastructure Module 4.1.
Module – 14 Securing the Storage Infrastructure
Securing Information Systems
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Information Security Technological Security Implementation and Privacy Protection.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Securing the Storage Infrastructure
Information Systems Security Computer System Life Cycle Security.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Module 14: Configuring Server Security Compliance
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Information Security What is Information Security?
© 2009 EMC Corporation. All rights reserved. EMC Proven Professional The #1 Certification Program in the information storage and management industry Storage.
Module 6: Designing Security for Network Hosts
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Chapter 2 Securing Network Server and User Workstations.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Module 11: Designing Security for Network Perimeters.
Module 9: Designing Security for Data. Overview Creating a Security Plan for Data Creating a Design for Security of Data.
Introduction to Information Security
Chap1: Is there a Security Problem in Computing?.
Module 2: Designing Network Security
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Presented by: Dr. Munam Ali Shah
Chapter 1: Security Governance Through Principles and Policies
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
Module 7: Designing Security for Accounts and Services.
IS3220 Information Technology Infrastructure Security
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
Module 5: Designing Physical Security for Network Resources
Information Security, Theory and Practice.
IS4680 Security Auditing for Compliance
IS4680 Security Auditing for Compliance
How to Mitigate the Consequences What are the Countermeasures?
Presentation transcript:

Storage Security and Management: Security Framework Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Section 4 : Storage Security and Management Lecture 31 Storage Security and Management: Security Framework Securing the Storage Infrastructure

Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Chapter Objective Upon completion of this chapter, you will be able to: Define storage security Discuss storage security framework Describe storage security domains Application, Management, Backup Recovery and Archive (BURA) Securing the Storage Infrastructure

Lesson: Building Storage Security Framework Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Lesson: Building Storage Security Framework Upon completion of this lesson, you will be able to: Define storage security Discuss the elements to build storage security framework Security services Define Risk triad Securing the Storage Infrastructure

What is Storage Security? Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. What is Storage Security? Application of security principles and practices to storage networking (data storage + networking) technologies Focus of storage security: secured access to information Storage security begins with building a framework Security Storage Networking Securing the Storage Infrastructure

Storage Security Framework Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Storage Security Framework A systematic way of defining security requirements Framework should incorporates: Anticipated security attacks Actions that compromise the security of information Security measures Control designed to protect from these security attacks Security framework must ensure: Confidentiality Integrity Availability Accountability Securing the Storage Infrastructure

Storage Security Framework: Attribute Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Storage Security Framework: Attribute Confidentiality Provides the required secrecy of information Ensures only authorized users have access to data Integrity Ensures that the information is unaltered Availability Ensures that authorized users have reliable and timely access to data Accountability Accounting for all events and operations that takes place in data center infrastructure that can be audited or traced later Helps to uniquely identify the actor that performed an action Securing the Storage Infrastructure

Understanding Security Elements Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Understanding Security Elements The Risk Triad Risk Threat Agent Threats Assets Give rise to Threat Wish to abuse and/or may damage That exploit Vulnerabilities Vulnerabilities Leading to to reduce Risk Countermeasure impose Owner to Asset Value Securing the Storage Infrastructure

Security Elements: Assets Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Security Elements: Assets “Information” – The most important asset Other assets Hardware, software, and network infrastructure Protecting assets is the primary concern Security mechanism considerations: Must provide easy access to information assets for authorized users Make it very difficult for potential attackers to access and compromise the system Should only cost a small fraction of the value of protected asset Should cost a potential attacker more, in terms of money and time, to compromise the system than the protected data is worth Securing the Storage Infrastructure

Security Elements: Threats Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Security Elements: Threats Potential attacks that can be carried out on an IT infrastructure Passive attacks Attempts to gain unauthorized access into the system Threats to confidentiality of information Active attacks Data modification, Denial of Service (DoS), and repudiation attacks Threats to data integrity and availability Attack Confidentiality Integrity Availability Accountability Access √ Modification Denial of Service Repudiation Securing the Storage Infrastructure

Security Elements: Vulnerabilities Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Security Elements: Vulnerabilities Vulnerabilities can occur anywhere in the system An attacker can bypass controls implemented at a single point in the system Requires “defense in depth” – implementing security controls at each access point of every access path Failure anywhere in the system can jeopardize the security of information assets Loss of authentication may jeopardize confidentiality Loss of a device jeopardizes availability Securing the Storage Infrastructure

Security Elements: Vulnerabilities (cont.) Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Security Elements: Vulnerabilities (cont.) Understanding Vulnerabilities Attack surface Refers to various access points/interfaces that an attacker can use to launch an attack Attack vector A path or means by which an attacker can gain access to a system Work factor Amount of time and effort required to exploit an attack vector Solution to protect critical assets: Minimize the attack surface Maximize the work factor Manage vulnerabilities Detect and remove the vulnerabilities, or Install countermeasures to lessen the impact Securing the Storage Infrastructure

Countermeasures to Vulnerability Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Countermeasures to Vulnerability Implement countermeasures (safeguards or controls) in order to lessen the impact of vulnerabilities Controls are technical or non-technical Technical implemented in computer hardware, software, or firmware Non-technical Administrative (policies, standards) Physical (guards, gates) Controls provide different functions Preventive – prevent an attack Corrective – reduce the effect of an attack Detective – discover attacks and trigger preventive/corrective controls Securing the Storage Infrastructure

Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Lesson Summary Key topics covered in this lesson: Storage security Storage security framework Security attributes Security elements Security controls Securing the Storage Infrastructure

Lecture 32 Storage security domains, List and analyzes the common threats in each domain

Lesson: Storage Security Domains Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Lesson: Storage Security Domains Upon completion of this lesson, you will be able to: Describe the three security domains Application Management Backup & Data Storage List the security threats in each domain Describe the controls that can be applied Securing the Storage Infrastructure

Storage Security Domains Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Storage Security Domains : Application Access Management Access Secondary Storage Backup, Recovery & Archive Application Access STORAGE NETWORK Data Storage Securing the Storage Infrastructure

Application Access Domain: Threats Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Application Access Domain: Threats Spoofing host/user identity Array V2 V2 V2 V2 V2 V2 V2 V2 Host A Volumes LAN FC SAN Array V1 V1 V1 V1 Host B V1 V1 V1 V1 Spoofing identity Elevation of privilege Unauthorized Host Volumes Media theft Securing the Storage Infrastructure

Securing the Application Access Domain Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Securing the Application Access Domain Spoofing User Identity (Integrity, Confidentiality) Elevation of User privilege (Integrity, Confidentiality) User Authentication (Technical) User Authorization (Technical, Administrative) Strong authentication NAS: Access Control Lists Controlling User Access to Data Spoofing Host Identity (Integrity, Confidentiality) Elevation of Host privilege (Integrity, Confidentiality) Host and storage authentication (Technical) Access control to storage objects (Technical, Administrative) Storage Access Monitoring (Technical) iSCSI Storage: Authentication with DH-CHAP SAN Switches: Zoning Arrays: LUN Masking Controlling Host Access to Data Threats Available Controls Examples Securing the Storage Infrastructure

Securing the Application Access Domain Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Securing the Application Access Domain Tampering with data at rest (Integrity) Media theft (Availability, Confidentiality) Encryption of data at rest (Technical) Data integrity (Technical) Data erasure (Technical) Storage Encryption Service NAS: Antivirus and File extension control CAS: Content Address Data Erasure Services Tampering with data in flight (Integrity) Denial of service (Availability) Network snooping (Confidentiality) IP Storage: IPSec Fibre Channel: FC-SP (FC Security Protocol) Controlling physical access to Data Center Infrastructure integrity (Technical) Storage network encryption (Technical) Protecting Storage Infrastructure Protecting Data at rest (Encryption) Threats Available Controls Examples Securing the Storage Infrastructure

Management Access Domain: Threats Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Management Access Domain: Threats Storage Management Spoofing user identity Elevation of user privilege Platform Host B Spoofing host identity Host A Unauthorized Host Console LAN or CLI FC Switch Production Host Production Remote Storage Array A Storage Array B Storage Infrastructure Securing the Storage Infrastructure

Securing the Management Access Domain Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Securing the Management Access Domain Spoofing User / Administrator identity (Integrity) Elevation of User / Administrator privilege (Integrity) User Authentication User Authorization Audit (Administrative, Technical) Authentication: Two factor authentication, Certificate Management Authorization: Role Based Access Control (RBAC) Security Information Event Management Controlling Administrative Access SSH or SSL over HTTP Encrypted links between arrays and hosts Private management network Disable unnecessary network services Tempering with data (Integrity) Denial of service (Availability) Network snooping (confidentiality) Mgmt network encryption (Technical) Mgmt access control (Administrative, Technical) Protecting Mgmt Infrastructure Threats Available Controls Examples Securing the Storage Infrastructure

Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. BURA Domain: Threats Unauthorized Host Spoofing DR site identity Storage Array Storage Array DR Network Local Site DR Site Media theft Securing the Storage Infrastructure

Protecting Secondary Storage and Replication Infrastructure Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Protecting Secondary Storage and Replication Infrastructure Spoofing DR site identity (Integrity, Confidentiality) Tampering with data (Integrity) Network snooping (Integrity, Confidentiality) Denial of service (Availability) Primary to Secondary Storage Access Control (Technical) Backup encryption (Technical) Replication network encryption (Technical) External storage encryption services Built in encryption at the software level Secure replication channels (SSL, IPSec) Threats Available Controls Examples Securing the Storage Infrastructure

Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Lesson Summary Key topics covered in this lesson: The three security domains Application Management Backup & Data Storage Security threats in each domain Security controls Securing the Storage Infrastructure

Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved.  Check Your Knowledge What are the primary security attributes? What are the three data security domains? Securing the Storage Infrastructure