Você está na página 1de 10

NETAPP WHITE PAPER

Using Encryption to Increase the Security of Networked Storage


NetApp February 2009 | WP-7069-0209

PROTECTING CRITICAL CORPORATE INFORMATION WITHIN AND ACROSS DATA CENTERS


IT managers are working hard to ensure the security and integrity of key enterprise data. Damage to data can occur as a result of an intentional attack from a variety of sources, including hackers, terrorists, company competitors, and disgruntled employees. Storage encryption is one of the core features of a storage security strategy that is rapidly gaining popularity with enterprises that process and store data. Storage encryption solutions use encryption technologies to secure data whether it is online, backed up, or archived, and whether it is in flight or at rest. This white paper presents the various paths to encrypting data, the tradeoffs and considerations that organizations may face, and the NetApp storage encryption portfolio.

TABLE OF CONTENTS 1 2 3 4 5 INTRODUCTION ....................................................................................................................... 3 THE NEED TO ENCRYPT STORAGE DATA .......................................................................... 3 THREAT MODEL FOR DATA AT REST AND DATA IN FLIGHT ........................................... 4 CHOOSING AN ENCRYPTION SOLUTION ............................................................................ 4 WHERE AND HOW TO IMPLEMENT ENCRYPTION ............................................................. 5
ENCRYPTION IN THE APPLICATION OR DATABASE ...........................................................................................5 ENCRYPTION IN THE FILE SYSTEM OR OPERATING SYSTEM ..........................................................................5 ENCRYPTION IN THE DEVICE DRIVER OR NETWORK INTERFACE ...................................................................5 CENTRALIZED ENCRYPTION ON THE NETWORK ................................................................................................6 ENCRYPTION IN THE STORAGE DEVICE ..............................................................................................................6 DECIDING WHICH ENCRYPTION METHOD TO USE .............................................................................................7

NETAPP ENCRYPTION SOLUTIONS ..................................................................................... 8


NETAPP DATAFORT ................................................................................................................................................8 BROCADE ENCRYPTION .........................................................................................................................................9

CONCLUSION ............................................................................................................................... 10

Using Encryption to Increase the Security of Networked Storage

INTRODUCTION

IT managers are working hard to ensure the security and integrity of key enterprise data. Damage to data can occur as the result of an intentional attack from a variety of sources, including hackers, terrorists, company competitors, and disgruntled employees. Data can also be damaged by accident, by careless or poorly trained employees. Whether malicious or accidental, the consequences of a threat exploiting a vulnerability can be devastating to the enterprise. Inadequate security can result in the disclosure of confidential data to unauthorized recipients, loss of integrity due to damaged or deleted data, and loss of access to the data. To reduce the risks of exposing or damaging company data, IT managers must evaluate all of their data storage security processes. Organizations that are effectively protecting their data obtain many benefits, including increased customer trust; reduced losses due to fraud or theft; maintaining privacy and integrity of data while at rest or in flight; and the ability to achieve compliance with industry regulations. Storage encryption is one of the core features of a storage security strategy that is rapidly gaining popularity with enterprises that process and store data. Storage encryption solutions use encryption technologies to secure data whether it is online, backed up, or archived, both in transit (data n flight) and on the storage medium (data at rest). Storage encryption enables enterprises to cost effectively protect the confidentiality of data stored in their storage infrastructure networks. By encrypting stored data, enterprises gain the ability to protect the companys private data from accidental or malicious intruders, reduce capital expenditures, and achieve savings in data transport costs.

THE NEED TO ENCRYPT STORAGE DATA

The advantages of networked data storage technologies such as network-attached storage (NAS) and storage area networks (SAN) are well established, but having data on a network creates significant security risks. Data that resides in a networked storage environment can be much more vulnerable to unauthorized access, theft, and misuse than data stored in direct-attached storage (DAS) appliances. This is because aggregated storage in a SAN is not designed to compartmentalize the data it contains. As a result of pooling storage, data that originated in different applications or company divisions becomes comingled when stored in the network. Data backups, off-site mirroring, and other data replication techniques further increase the risk of unauthorized access to data from people both inside and outside the company firewall. With storage networks, a single security breach can threaten much larger data repositories than isolated storage systems. Curious or malicious insiders, administrators, partners, hackers, contractors, and outsourced service providers can all gain access to data quite easily. IT managers are seeking storage infrastructure solutions that will help them minimize risks and achieve the following goals. Achieving internal and external compliance: Complying with external entities and laws, such as PCI, SEC, GLBA, HIPAA,, and SOX Maintaining internal security policies and access controls Minimizing the risk of unauthorized access Securing intellectual property: Maintaining competitive advantage by securing the most important business assets Protecting key data from internal and external attacks Reducing TCO: Achieving quick, easy, plug-in deployment Minimizing costly changes to storage infrastructure Securing data at rest and data in flight Current technologiessuch as firewalls, Intrusion Prevention Systems (IPSs), and Virtual Private Networks (VPNs)seek to secure data assets by protecting the perimeter of the network. LUN masking and zoning in SAN environments also attempt to address concerns about security. Unfortunately, these targeted approaches cannot adequately secure storage if data is still stored in cleartext (that is, data that is transferred or stored without cryptographic protection). Encrypting data at rest on tape and disk as well as

Using Encryption to Increase the Security of Networked Storage

data in transit significantly mitigates these threats and enables enterprises to secure data while maintaining current service levels for operations.

THREAT MODEL FOR DATA AT REST AND DATA IN FLIGHT

Over the lifespan of data, nearly all media eventually leave the owners control, either when it is decommissioned at its end of life or end of lease or is returned for warranty or repair. Loss of physical control of storage media includes all media types, such as removable media such as tape cartridges, disk drives in servers, and networked storage drives. Even if the media is decommissioned due to end-of-life or system failure, the data on that media may still be readable. For example, data on the vast majority of failed hard drives can still be read; even drives that were part of a striped array are also at risk. Disk striping divides a body of data into blocks and spreads the data blocks across several partitions on several hard disks, but in a failure, some data remains. The typical stripe size in todays arrays is large enough to expose hundreds of customer names and social security numbers. Some companies require data cleansing before recycling all storage media. However, these methods do not guarantee the elimination of the data. These security processes can be ineffective if human beings misplace or skip any media that need to be sanitized before recycling. Even if all media are cleansed, overwriting media can take hours or days, may miss reallocated portions of the media, or may not work at all under certain failure conditions. There is also no indication of when the processes are complete. It is clear that most methods of data cleansing are imperfect. These issues and the increasing risks of data exposure have rapidly accelerated the widespread interest in encryption. Encryption can automatically secure the data when the media leave the owners controlwithout dependence on humans and costly, time-consuming, and imperfect processes.

CHOOSING AN ENCRYPTION SOLUTION

One of the most effective methods of protecting the privacy of data is to encrypt it. Encryption is the process of converting readable cleartext into unreadable ciphertext, which can later be decrypted back into the original content. Encryption technologies can be used to protect an organization's SAN, NAS, tape, and iSCSI data stores. Storage security technology is based on an array of encryption algorithms. However, all encryption algorithms have finite periods of usability. As the existing encryption algorithms age and processor power increases, todays algorithms become progressively more vulnerable to breaking. Earlier encryption algorithms such as DES and 3DES, and hashing algorithms such as MD5 and SHA-1, are now considered to be insecure. Effective encryption solutions should take advantage of the strongest commercially available algorithms such as AES. It is also important to consider the complete security of a systemencryption is only as strong as its weakest link. If data is encrypted using AES-256, but keys are stored in cleartext and left in an open operating system, it is fairly easy to compromise the entire system. Because of the changing nature of encryption standards, it is also important that the encryption solution can be upgraded to address emerging standards without requiring full hardware replacement. Effective encryption solutions should provide the following functionality: No performance impact: The solution should be able to compress and encrypt data at wire speeds without a requirement for additional CPU overhead. Ease of Installation: An effective solution should deploy seamlessly into the current IT environment. Installation should require zero downtime and not cause any disruption to workflow. It should not require any modifications to the hosts, servers, and applications, and it should not necessitate forklift upgrades to storage. Strong Key Management: The solution should provide secure encryption keys and maximize availability when needed. Scalability: As the amount of data grows, the solution should scale cost effectively.

Using Encryption to Increase the Security of Networked Storage

When selecting an encryption solution, it is also important to make sure that the solution has gone through formal, independent certification. The standard certification body for encryption technologies is the National Institute of Standards and Technology (NIST), which tests and certifies third-party products against a standard called the Federal Information Processing Standard (FIPS). Other certifications, most notably the international Common Criteria standard, are also used to validate that encryption products have been built properly. Without independent validation, it is difficult to be sure that the products perform as promised.

WHERE AND HOW TO IMPLEMENT ENCRYPTION

There are several choices for where and how to implement encryption. Each method imposes some tradeoffs for performance, complexity, and ease of use. The following sections examine the pros and cons of each method.

ENCRYPTION IN THE APPLICATION OR DATABASE


If it is possible to identify specific data that must be protected, it may be possible to encrypt just the sensitive or valuable data. For example, a database application could enable encryption at the column level. The advantage of this type of approach is that the amount of data being encrypted is minimized so that the performance impact on the application is potentially minimized. The challenges of this type of approach include the ability to properly identify all fields that contain sensitive or regulated data and ensuring that any changes to the application or schema take into account whether they should be encrypted. Because application encryption is specific to a given application, if multiple applications require access to encrypted data it is difficult, if not impossible, to find compatible solutions that use a common key management infrastructure. Further, it is likely that one or more of the applications will not natively support its own encryption mechanism.

ENCRYPTION IN THE FILE SYSTEM OR OPERATING SYSTEM


Several operating systems provide options for either turning on encryption in the native file system or adding an encryption facility on top of the native file system. Traditionally, additional software may be installed on a server that enables the user to encrypt and decrypt individual files. Performing selective encryption may reduce the impact on performance. In addition, as host processors in devices like laptops became more powerful, full disk and full file system encryption have been introduced. The advantage of using selective encryption by file is that it can reduce the performance impact. However, users may have to be involved in performing the encryption and decryption as an extra step. By encrypting all files, users may not see the encryption and decryption steps, but there is likely to be a performance impact. Performing encryption in the servers provides the ability to provision encryption processing where its needed. The downside is that it will probably be intrusive to the operations of that server. If encryption is done in software, performance on that server is significantly affected whenever a nontrivial amount of data must be encrypted. It may be possible for encryption is to be done in specialized hardware added to these hosts, but there will be downtime for each server to be shut down, have the coprocessor installed, reboot, install the driver software (and perhaps reboot again), test the applications, and bring it back on line. In large enterprises with tens, hundreds, or thousands of servers, this could be extremely invasive to operations. Further, because this deployment does not happen instantaneously, IT must plan the rollout very carefully. There will be periods when some servers are encrypting data and others are unable to access it. Finally, it is important to find a solution that supports all the host configurations (both hardware and OS) that the enterprise uses today and will use in the future.

ENCRYPTION IN THE DEVICE DRIVER OR NETWORK INTERFACE


Data can be encrypted in the network interface, such as a host bus adapter or network interface card. Some network cards include dedicated hardware logic for accelerating the cryptographic functions. The information is protected from the server through the SAN to the storage. Currently, this type of solution tends to focus on data in flight versus data at rest, where there is a possibility of capturing data in flight and performing an analysis to find the keys and access the data.

Using Encryption to Increase the Security of Networked Storage

Temporary keys are used and periodically updated. When solutions focus on data at rest, encryption keys protect data for much longer periods of time. This requires that the length of the key and strength of encryption are sized appropriately and that key management includes the ability to maintain keys for long periods of time.

CENTRALIZED ENCRYPTION ON THE NETWORK


Network-based encryption offers the benefits of centralized encryption and key management and enabling encryption on existing storage devices. The centralized approach to encryption in the network uses one key vault and management application to encrypt data for multiple types of heterogeneous storage (disk and tape). Instead of buying several devices that enable encryption for a given application, network-based solutions encrypt data for multiple applications and use the same user interface to manage encryption policies. Network-based implementations enable encryption from a centralized location to existing storage devices. Without upgrading end devices, network-based encryption can selectively encrypt data to meet the needs of the organization. For SAN-based disk-based encryption, the user can configure encryption at the logical unit (LUN) level so that only specific application data is encrypted on large storage arrays. In NAS-based encryption of online data on disk, the encryption is done at the network-share level. For tape-based encryption, data encryption keys can be associated to individual tapes or tape pools to refine the granularity of encryption. Although some initial deployments added significant latency to the encryption process, the latest generation of solutions adds a minimal amount of delay to ensure that backup windows are maintained in tape applications. With network-based encryption, users have the flexibility and power to encrypt data on legacy storage devices and to encrypt only the data than needs to be encrypted.

ENCRYPTION IN THE STORAGE DEVICE


Self-encrypting storage devices embed encryption in the storage device itself, providing full disk encryption so that fine-grained data classification is not needed and the device can leave the owners control securely. Neither the encryption key nor the encrypted text ever leave the device, enhancing security, greatly simplifying key management, and making the encryption transparent to the OS, databases, and applications. Because the encryption key does not leave the device, there is no need to track or manage the encryption keys. Cryptographic processing within the device can potentially have no measurable performance impact on the system, and it allows the encryption to scale linearly automatically as more storage is added to the system. All data can be encrypted, with no performance degradation, so there is no need to classify which data to encrypt. Its easy to quickly and securely erase the entire device by erasing the encryption key in the device, without worry that there may be a copy of that encryption key somewhere outside the device. The key has never left the device and there is no other copy, so the proof of data destruction is the execution of that single process. The need to reencrypt data is minimized because the encryption key doesnt need to be changed when an administrator leaves the job. Encrypting in the device may add cost to that device, and the implementation schedule may affect the natural replacement schedule of storage devices. However, this impact may be offset by the fact that it is being implemented in standard storage devices and cuts device decommissioning costs and headaches.

Using Encryption to Increase the Security of Networked Storage

DECIDING WHICH ENCRYPTION METHOD TO USE


Each method of encryption has its advantages and disadvantages. The following table can help decide which approach is the best choice for a given deployment:
Table 1) Encryption method advantages and disadvantages. Encryption Layer Database or Application Considerations Is all sensitive data in one or two columns in a database? Will application performances be affected? Advantages Minimal performance impact on the application Challenges Must identify all fields with sensitive or regulated data Need to ensure that all changes to application or schema include whether they should be encrypted Difficult to find compatible solutions that use a common key management infrastructure Some applications may not natively support their own encryption mechanism File System or Operating System Will it be uniform across all environments and operating systems? Will performance be affected or disrupted? Provides the ability to provision encryption processing where it is needed May allow selective encryption Users may have to be involved in invoking the encryption and decryption as an extra step If encryption is done in software, performance on that server is significantly affected whenever a nontrivial amount of data needs to be encrypted Solution must support all host configurations (both hardware and OS) that the enterprise uses today and will use in the future May affect performance Device Driver or Network Interface Will scalability be an issue as data grows? Is port connectivity, rack space, or power an issue? Will interoperability with other SAN devices be an issue? How many storage devices need to be protected? Storage Device Will encryption work across all vendor storage (that is, heterogeneous) environments? What kind of key management will be used? Information is protected from the server through the SAN to the storage Current solutions tend to focus on data in flight versus data at rest where there is a possibility of capturing data in flight and performing an analysis to find the keys and access the data. Some early solutions added latency to the encryption process, but newer solutions add less than a millisecond of delay to ensure that backup windows are maintained in tape applications

Network

Enables encryption on existing storage devices Can selectively encrypt only the data than needs to be encrypted

Provides full disk encryption The device can leave the owners control securely Simplifies key management No significant performance impact to the system Allows encryption to scale linearly automatically as more storage is added to the system No need to classify which data to encrypt

May not work across all vendor storage environments May add cost to the device Requires forklift upgrade of existing storage devices

Using Encryption to Increase the Security of Networked Storage

NETAPP ENCRYPTION SOLUTIONS

Enterprises can now secure sensitive data across the entire organization and manage stored data through NetApps enterprise-wide foundation of control. NetApp storage security systems deliver nondisruptive, comprehensive protection for sensitive data across the enterprise, for both data at rest and data in flight. NetApp storage solutions enable enterprises to protect intellectual property and confidential information, more easily comply with industry and government regulations, and preserve company reputation by avoiding publicized loss of data.

NETAPP DATAFORT
NetApp DataFort systems combine secure access controls, authentication, storage hardwarebased encryption, and secure logging to protect stored data. NetApp DataFort appliances provide protection for the following environments: E-Series DataFort appliances: NAS stores and iSCSI storage FC-Series DataFort appliances: FC SAN and tape storage mediums S-Series DataFort appliances: SCSI tape environments NetApp DataFort storage security appliances enable enterprises to secure networked storage by locking down stored data with strong encryption and by routing access for all secured data through secure hardware. The appliances are designed to maximize security without affecting network performance or user workflows. As a result, storage administrators can confidently and quickly encrypt all sensitive data,

Figure 1) NetApp DataFort storage encryption.

With NetApp DataFort appliances, storage and security administrators have the ability to: Compartmentalize data in centralized storage devices to provide an additional layer of protection for secure data Encrypt and secure data on storage devices and in transit Protect backup media, mirrored servers, and disaster recovery sites Comply with security and privacy regulations Protect sensitive stored data from unauthorized access with secure access controls, authentication, storage encryptions, and secure logging Generate customizable logs to track relevant events to record a history of administrative actions and identify who is trying to intrude into the network Fend off security breaches by using AES 256-bit encryption and a true random number generator to create strong keys that never leave the secure hardware of NetApp DataFort

Using Encryption to Increase the Security of Networked Storage

Figure 2) NetApp DataFort customer example.

All NetApp security appliances support creation of administrators with granular, customizable roles. Each administrator role is allowed only a subset of duties, so that responsibilities are distributed among multiple individuals. NetApp DataFort is flexible enough to allow creation of custom administrator roles by combining multiple roles into an administrator that suits a companys unique needs. To provide an irrefutable audit trail for encrypted data access and administrator activity, secure audit logging is available for all NetApp storage security appliances. Each log message can be cryptographically signed. Attempts to modify the signature or the logs themselves can be easily verified for integrity and authenticity.

BROCADE ENCRYPTION
NetApp and Brocade have developed a joint fabric-based data encryption approach that delivers nondisruptive encryption and provides a centralized point of management for storage security and key management. The joint solution helps to enable a whole new level of encryption performance by giving customers the ability to quickly and easily encrypt corporate data for increased security and compliance with simplified policy management. Additionally, the incorporation of NetApp technology enables NetApp customers to operate the Brocade Encryption Switch in NetApp DataFort compatibility mode, serving as a next-generation NetApp DataFort security appliance. The joint encryption solutions are available on the Brocade Encryption Switch, a high-performance, 32-port, auto-sensing 8Gbit/sec Fibre Channel switch, and the Brocade FS8-18 Encryption Blade, which provides the same plug-in storage security services in a 16-port blade for use in the Brocade DCX Backbone. For simplified customer deployment with lower risk, the Brocade data encryption solutions can be implemented without disruption into the fabric and applied to specified data flows. Both encryption products preserve existing and new storage investments by supporting a heterogeneous mix of networked storage systems and providing future support for virtual tape libraries and tape drives. Benefits of the joint NetApp and Brocade solution include: No performance impact: Users realize unparalleled encryption processing speeds (up to 96Gbit/sec), which means that they can encrypt without the traditional performance penalty. Ease of installation: The solution plugs in to networks that support all heterogeneous servers (including virtual machines) in data center fabrics. Implementation is easy, with nonintrusive deployment into the SAN switching fabric.

Using Encryption to Increase the Security of Networked Storage

Strong, centralized key management: Protects against electronic and physical attacks. Customers can deploy maximum security through tamper-proof hardware enclosures, key signing, role-based administration, and quorum control with the NetApp Lifetime Key Management solution. Enterprise-class scalability: IT can scale storage enterprise-wide and on demand, enabling pay as you grow for quick implementation of data security. Minimized operating costs: Low power requirements minimize operating costs as enterprises scale up, lowering the total cost of ownership necessary to encrypt massive amounts of data.

CONCLUSION
Networked storage speeds access to informationbut it can also leave data vulnerable. Firewalls and intrusion-prevention systems can secure assets at the perimeter, but data at the storage core can still be exposed to both internal and external attacks. IT organizations are working hard to ensure the security of the companys valuable data assets, complying with regulatory mandates, meeting industry standards for data confidentiality, and ensuring data security from any and all threats. Enterprises that effectively protect key data experience many benefits, including increased customer trust, reduced losses due to fraud or theft, and the ability to comply with industry regulations. NetApp and Brocade provide industry-leading storage encryption and key management capabilities that enable enterprises to achieve security throughout the entire lifecycle of regulated and sensitive data without disrupting applications, clients, servers, or user workflow. For more information about NetApp storage security systems and the joint NetApp and Brocade solution, go to http://www.netapp.com/us/products/storage-security-systems/.

www.netapp.com

10

2009 NetApp. All rights reserved. Specifications are subject to change without notice. NetApp, the NetApp logo, Go further, faster and and Lifetime Key Management are trademarks or registered trademarks of NetApp, Inc. in the United States and/or other countries. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. Using Encryption to Increase the Security of Networked Storage WP-7069-0209

Você também pode gostar