Integrated Standards For Storage Security Lacking: Experts
Vendors need to come out with open products that integrate encryption, access control, and auditing.
Businesses need to integrate various technologies to tighten storage security in response to regulatory pressure, a storage advisory group said Tuesday.
Wikibon, a newly formed community of experts that offers free research and advisory services, hosted a teleconference to assess the state of storage security and technological advancements.
Companies need to integrate compliance requirements with life cycle management, "so that data is secured and you can track it from beginning to end," said David Floyer, a former IDC analyst and one of the founders of Wikibon.
Floyer said encryption is one way to secure data when it comes to storage, but it's just part of the solution. It's not feasible to encrypt all data in a data center, since the volumes of data are typically too large and there are too many servers accessing data, among other factors. It makes sense to encrypt data where there's a regulatory requirement, such as personal records. Encryption also makes sense when transporting data over a network or physically by tape, Floyer said.
Access control is the other piece of the puzzle. It helps prevent people from gaining unauthorized access to data through a corporate network. As a result, more businesses are making it a requirement to integrate network security and storage security through the use of Internet Protocol storage.
"The uncomfortable answer for organizations is that 90% of data exposure comes from within the organization. You have to understand who looked at what when and who changed what and when. You need to know that it happened and deter people," said Floyer. Audit trails are necessary.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.
Join us for a roundup of the top stories on InformationWeek.com for the week of December 14, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program.